Sciweavers

1970 search results - page 75 / 394
» Node Localisation in Wireless Ad Hoc Networks
Sort
View
ICC
2007
IEEE
124views Communications» more  ICC 2007»
15 years 10 months ago
Emulating End-to-End Losses and Delays for Ad Hoc Networks
— Ad hoc networks have gained place in the research area recently. There are many researches regarding different topics related to such networks, such as routing, media access co...
Alaa Seddik-Ghaleb, Yacine Ghamri-Doudane, Sidi-Mo...
ICC
2008
IEEE
108views Communications» more  ICC 2008»
15 years 10 months ago
Minimizing Interferences in Wireless Ad Hoc Networks through Topology Control
— This paper investigates minimizing mutual interferences in wireless ad hoc networks by means of topology control. Prior work defines interference as a relationship between link...
Guinian Feng, Soung Chang Liew, Pingyi Fan
139
Voted
BROADNETS
2006
IEEE
15 years 10 months ago
Robust Demand-Driven Video Multicast over Ad hoc Wireless Networks
Abstract— In this paper, we address the problem of video multicasting in ad hoc wireless networks. The salient characteristics of video traffic make conventional multicasting pr...
D. Agrawal, Tamma Bheemarjuna Reddy, C. Siva Ram M...
MOBIQUITOUS
2005
IEEE
15 years 9 months ago
Defend Against Cache Consistency Attacks in Wireless Ad Hoc Networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, cache consistency issues must be addressed. T...
Wensheng Zhang, Guohong Cao
126
Voted
GLOBECOM
2009
IEEE
15 years 7 months ago
Multi-Path Key Establishment against REM Attacks in Wireless Ad Hoc Networks
Secure communications in wireless ad hoc networks require setting up end-to-end secret keys for communicating node pairs. Due to physical limitations and scalability requirements, ...
Tian Lan, Ruby B. Lee, Mung Chiang