Sciweavers

629 search results - page 71 / 126
» Design of a Medium Access Control Protocol for Dynamic Spect...
Sort
View
SIGCOMM
2010
ACM
13 years 8 months ago
Fived: a service-based architecture implementation to innovate at the endpoints
Security functions such as access control, encryption and authentication are typically left up to applications on the modern Internet. There is no unified system to implement thes...
D. J. Capelis, Darrell D. E. Long
CORR
2012
Springer
198views Education» more  CORR 2012»
12 years 3 months ago
Token-DCF: An Opportunistic MAC protocol for Wireless Networks
—IEEE 802.11 DCF is the MAC protocol currently used in wireless LANs. 802.11 DCF is inefficient due to two types of overhead; channel idle time and collision time. This paper pr...
Ghazale Hosseinabadi, Nitin H. Vaidya
COMCOM
2007
125views more  COMCOM 2007»
13 years 7 months ago
Guaranteeing the network lifetime in wireless sensor networks: A MAC layer approach
Energy is the most crucial but scarce resource in wireless sensor networks (WSNs). A wealth of MAC protocols are proposed only to prolong the network lifetime for energy-efficienc...
Yongsub Nam, Taekyoung Kwon, Hojin Lee, Hakyung Ju...
ACSAC
2004
IEEE
13 years 11 months ago
PEACE: A Policy-Based Establishment of Ad-hoc Communities
Ad-hoc networks are perceived as communities of autonomous devices that interconnect with each other. Typically, they have dynamic topologies and cannot rely on a continuous conne...
Sye Loong Keoh, Emil Lupu, Morris Sloman
MOBICOM
2004
ACM
14 years 1 months ago
SPAWN: a swarming protocol for vehicular ad-hoc wireless networks
Future vehicular networks are expected to deploy shortrange communication technology for inter-vehicle communication. In addition to vehicle-to-vehicle communication, users will b...
Shirshanka Das, Alok Nandan, Giovanni Pau