Sciweavers

1970 search results - page 27 / 394
» Node Localisation in Wireless Ad Hoc Networks
Sort
View
IPCCC
2006
IEEE
14 years 2 months ago
Overcoming the challenge of security in a mobile environment
The secure operation of ad hoc networks faces the novel challenge of location verification on top of the security challenges that wireline networks face. The novelty lies in the ...
Ioannis Broustis, Michalis Faloutsos, Srikanth V. ...
GLOBECOM
2009
IEEE
14 years 3 months ago
Adaptive Probabilistic Medium Access in MPR-Capable Ad-Hoc Wireless Networks
—Medium access in ad-hoc wireless networks must be performed in a distributed fashion due to lack of coordination between nodes. Specifically, when nodes are capable of receivin...
Majid Ghanbarinejad, Christian Schlegel, Pawel Gbu...
ICC
2000
IEEE
144views Communications» more  ICC 2000»
14 years 27 days ago
Fisheye State Routing: A Routing Scheme for Ad Hoc Wireless Networks
– This paper presents a novel routing protocol for wireless ad hoc networks – Fisheye State Routing (FSR). FSR introduces the notion of multi-level fisheye scope to reduce rou...
Guangyu Pei, Mario Gerla, Tsu-Wei Chen
ESA
2003
Springer
98views Algorithms» more  ESA 2003»
14 years 1 months ago
Network Lifetime and Power Assignment in ad hoc Wireless Networks
In ad-hoc wireless networks, certain network connectivity constraints are of interest because of their practical importance. An example of such a constraint would be strong connec...
Gruia Calinescu, Sanjiv Kapoor, Alexander Olshevsk...
PERCOM
2005
ACM
14 years 8 months ago
Understanding the real behavior of Mote and 802.11 ad hoc networks: an experimental approach
IEEE 802.11 and Mote devices are today two of the most interesting wireless technologies for ad hoc and sensor networks respectively, and many efforts are currently devoted to und...
Giuseppe Anastasi, Eleonora Borgia, Marco Conti, E...