Sciweavers

1265 search results - page 139 / 253
» Randomized Algorithms and Probabilistic Analysis in Wireless...
Sort
View
MOBIHOC
2005
ACM
14 years 8 months ago
A secure ad-hoc routing approach using localized self-healing communities
Mobile ad hoc networks (MANETs) are vulnerable to routing attacks, especially attacks launched by non-cooperative (selfish or compromised) network members and appear to be protoco...
Jiejun Kong, Xiaoyan Hong, Yunjung Yi, Joon-Sang P...
WIOPT
2006
IEEE
14 years 3 months ago
Ad Hoc networks with topology-transparent scheduling schemes: Scaling laws and capacity/delay tradeoffs
— In this paper we investigate the limiting properties, in terms of capacity and delay, of an ad hoc network employing a topology-transparent scheduling scheme. In particular, we...
Daniele Miorandi, Hwee Pink Tan, Michele Zorzi
ADHOCNOW
2005
Springer
14 years 2 months ago
An Intelligent Sensor Network for Oceanographic Data Acquisition
In this paper we describe the deployment of an offshore wireless sensor network and the lightweight intelligence that was integrated into the data acquisition and forwarding softwa...
Chris M. Roadknight, Antonio González, Laur...
MOBISYS
2004
ACM
14 years 8 months ago
Impact of Radio Irregularity on Wireless Sensor Networks
In this paper, we investigate the impact of radio irregularity on the communication performance in wireless sensor networks. Radio irregularity is a common phenomenon which arises...
Gang Zhou, Tian He, Sudha Krishnamurthy, John A. S...
BROADNETS
2007
IEEE
14 years 3 months ago
Detecting protected layer-3 rogue APs
— Unauthorized rogue access points (APs), such as those brought into a corporate campus by employees, pose a security threat as they may be poorly managed or insufficiently secu...
Hongda Yin, Guanling Chen, Jie Wang