Sciweavers

244 search results - page 14 / 49
» Phishing in the Wireless: Implementation and Analysis
Sort
View
WDAG
2010
Springer
158views Algorithms» more  WDAG 2010»
13 years 5 months ago
Distributed Contention Resolution in Wireless Networks
We present and analyze simple distributed contention resolution protocols for wireless networks. In our setting, one is given n pairs of senders and receivers located in a metric ...
Thomas Kesselheim, Berthold Vöcking
PODC
2010
ACM
13 years 5 months ago
Brief announcement: distributed contention resolution in wireless networks
We present and analyze simple distributed contention resolution protocols for wireless networks. In our setting, one is given n pairs of senders and receivers located in a metric ...
Thomas Kesselheim, Berthold Vöcking
ICASSP
2011
IEEE
12 years 11 months ago
Joint source-channel-network coding for bidirectional wireless relays
The application of joint source-channel coding, based on fountain codes, in the broadcast timeslot of wireless two-way network coding is investigated in this paper. A computationa...
Francois P. S. Luus, Bodhaswar T. Maharaj
ICNP
2000
IEEE
13 years 12 months ago
A Topology-Independent Fair Queueing Model in Ad Hoc Wireless Networks
Fair queueing of rate and delay-sensitive packet flows in a shared-medium, multihop wireless network remains largely unaddressed because of the unique design issues such as locat...
Haiyun Luo, Songwu Lu
BROADNETS
2007
IEEE
13 years 11 months ago
Energy-efficient transmission for multimedia streams in last-hop wireless internet
Multimedia applications have unique characteristics that can be leveraged to design energy-efficient loss recovery mechanisms. Given their loss tolerance and strict timing requirem...
Albert F. Harris III, Robin Snader, Robin Kravets