Sciweavers

291 search results - page 37 / 59
» Localizing Multiple Jamming Attackers in Wireless Networks
Sort
View
137
Voted
MOBISYS
2007
ACM
16 years 3 months ago
Context-for-wireless: context-sensitive energy-efficient wireless data transfer
Ubiquitous connectivity on mobile devices will enable numerous new applications in healthcare and multimedia. We set out to check how close we are towards ubiquitous connectivity ...
Ahmad Rahmati, Lin Zhong
VTC
2008
IEEE
158views Communications» more  VTC 2008»
15 years 10 months ago
A Novel Load Balanced and Lifetime Maximization Routing Protocol in Wireless Sensor Networks
Abstract— Balancing energy consumption and prolonging network lifetime are open challenges in Wireless Sensor Networks. In this paper, we design a novel load balanced routing pro...
Chengjie Wu, Ruixi Yuan, Hongchao Zhou
INFOCOM
2006
IEEE
15 years 10 months ago
Detecting Stations Cheating on Backoff Rules in 802.11 Networks Using Sequential Analysis
— As the commercial success of the IEEE 802.11 protocol has made wireless infrastructure widely deployed, user organizations are increasingly concerned about the new vulnerabilit...
Yanxia Rong, Sang Kyu Lee, Hyeong-Ah Choi
CISS
2007
IEEE
15 years 10 months ago
A High-Throughput Cross-Layer Scheme for Distributed Wireless Ad Hoc Networks
— In wireless ad hoc networks, distributed nodes can collaboratively form an antenna array for long-distance communications to achieve high energy efficiency. In recent work, Oc...
Athina P. Petropulu, Lun Dong, H. Vincent Poor
INFOCOM
2007
IEEE
15 years 10 months ago
Measurement-Based Self Organization of Interfering 802.11 Wireless Access Networks
— The popularity of IEEE 802.11 WLANs has led to dense deployments in urban areas. High density leads to suboptimal performance unless the interfering networks learn how to optim...
Bruno Kauffmann, François Baccelli, Augusti...