Sciweavers

433 search results - page 73 / 87
» Design and Implementation of a TCP-Friendly Transport Protoc...
Sort
View
ICC
2009
IEEE
130views Communications» more  ICC 2009»
14 years 2 months ago
Fast Power Control for Cross-Layer Optimal Resource Allocation in DS-CDMA Wireless Networks
—This paper presents a novel cross-layer design for joint power and end-to-end rate control optimization in DSCDMA wireless networks, along with a detailed implementation and eva...
Marco Belleschi, Lapo Balucanti, Pablo Soldati, Mi...
WINET
2008
100views more  WINET 2008»
13 years 7 months ago
SOLONet: Sub-optimal location-aided overlay network for MANETs
Overlay networks have made it easy to implement multicast functionality in wireless ad hoc networks. Their flexibility to adapt to different environments has helped in their stead...
Abhishek P. Patil, Yunhao Liu, Li Xiao, Abdol-Hoss...
MOBISYS
2008
ACM
14 years 7 months ago
Improving wireless privacy with an identifier-free link layer protocol
We present the design and evaluation of an 802.11-like wireless link layer protocol that obfuscates all transmitted bits to increase privacy. This includes explicit identifiers su...
Ben Greenstein, Damon McCoy, Jeffrey Pang, Tadayos...
SENSYS
2003
ACM
14 years 26 days ago
Minimum-energy asynchronous dissemination to mobile sinks in wireless sensor networks
Data dissemination from sources to sinks is one of the main functions in sensor networks. In this paper, we propose SEAD, a Scalable Energy-efficient Asynchronous Dissemination pr...
Hyung Seok Kim, Tarek F. Abdelzaher, Wook Hyun Kwo...
IJSN
2006
140views more  IJSN 2006»
13 years 7 months ago
Load-balanced key establishment methodologies in wireless sensor networks
: Wireless Sensor Networks (WSN) pose a need for dynamically establishing a secret key joint to a group of nodes. Elliptic Curve Cryptography (ECC) has emerged as a suitable public...
Ortal Arazi, Hairong Qi