Sciweavers

954 search results - page 39 / 191
» Application Performance Assessment on Wireless Ad Hoc Networ...
Sort
View
SUTC
2006
IEEE
14 years 1 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
ISMIR
2005
Springer
156views Music» more  ISMIR 2005»
14 years 1 months ago
Content-Based Music Information Retrieval in Wireless Ad-Hoc Networks
This paper, introduces the application of Content-Based Music Information Retrieval (CBMIR) in wireless ad-hoc networks. We investigate for the first time the challenges posed by...
Ioannis Karydis, Alexandros Nanopoulos, Apostolos ...
ICC
2007
IEEE
229views Communications» more  ICC 2007»
14 years 2 months ago
CD-MAC: Cooperative Diversity MAC for Robust Communication in Wireless Ad Hoc Networks
— This paper proposes a medium access control (MAC) algorithm, called Cooperative Diversity MAC (CD-MAC), which exploits the cooperative communication capability to improve robus...
Sangman Moh, Chansu Yu, Seung-Min Park, Heung-Nam ...
WIOPT
2006
IEEE
14 years 1 months ago
Link modeling with joint fading and distance uncertainty
— We introduce and discuss a novel link model that incorporates both uncertainty in the fading coefficients and the node distances for ad hoc networks with randomly placed nodes...
Martin Haenggi
NCA
2003
IEEE
14 years 29 days ago
Organizing a Distributed Application in a Mobile Ad Hoc Network
A distributed application that operates in an ad hoc network formed by mobile nodes must limit its use of all-to-all communication since the overall capacity of such a network is ...
Cristian Tuduce, Thomas R. Gross