Sciweavers

256 search results - page 20 / 52
» Power assignment for k-connectivity in wireless ad hoc netwo...
Sort
View
WOWMOM
2006
ACM
135views Multimedia» more  WOWMOM 2006»
14 years 1 months ago
A MAC Layer Protocol for Priority-based Reliable Multicast in Wireless Ad Hoc Networks
RTS-CTS handshake based protocols achieve “reliable unicast” by eliminating the hidden node problem effectively, however, these solutions are not directly or efficiently gene...
Murat Demirbas, Muzammil Hussain
GLOBECOM
2008
IEEE
13 years 8 months ago
Influence of Node Location Distributions on the Structure of Ad Hoc and Mesh Networks
We study the impact of the distribution of node locations on key properties of wireless networks. In particular, using Monte Carlo simulations we study in detail the behavior of av...
Janne Riihijärvi, Marina Petrova, Petri M&aum...
MASS
2010
248views Communications» more  MASS 2010»
13 years 5 months ago
Adaptive exploitation of cooperative relay for high performance communications in MIMO ad hoc networks
With the popularity of wireless devices and the increase of computing and storage resources, there are increasing interests in supporting mobile computing techniques. Particularly...
Shan Chu, Xin Wang
ICOIN
2005
Springer
14 years 1 months ago
On the Hidden Terminal Problem in Multi-rate Ad Hoc Wireless Networks
Multi-hop ad hoc wireless networks generally use the IEEE 802.11 Distributed Coordination Function (DCF) MAC protocol, which utilizes the request-to-send/clear-to-send (RTS/CTS) me...
Joon Yoo, Chongkwon Kim
AHSWN
2005
120views more  AHSWN 2005»
13 years 8 months ago
Low-Interference Topology Control for Wireless Ad Hoc Networks
Topology control has been well studied in wireless ad hoc networks. However, only a few topology control methods take into account the low interference as a goal of the methods. So...
Kousha Moaveninejad, Xiang-Yang Li