Sciweavers

2691 search results - page 477 / 539
» Security in Ad Hoc Networks
Sort
View
ICC
2009
IEEE
201views Communications» more  ICC 2009»
13 years 7 months ago
Analyzing Selfish Topology Control in Multi-Radio Multi-Channel Multi-Hop Wireless Networks
Typically, topology control is perceived as a per-node transmit power control process that achieves certain networklevel objectives. We take an alternative approach of controlling ...
Ramakant S. Komali, Allen B. MacKenzie
MIS
2011
Springer
256views Multimedia» more  MIS 2011»
13 years 4 months ago
Event sharing in vehicular networks using geographic vectors and maps
By exchanging events in a vehicular ad hoc network (VANET), drivers can receive information that allows them to find relevant places (e.g., parking spaces) or avoid dangerous/unde...
Thierry Delot, Sergio Ilarri, Nicolas Cenerario, T...
SIAMJO
2010
87views more  SIAMJO 2010»
13 years 4 months ago
Universal Rigidity and Edge Sparsification for Sensor Network Localization
Owing to their high accuracy and ease of formulation, there has been great interest in applying convex optimization techniques, particularly that of semidefinite programming (SDP)...
Zhisu Zhu, Anthony Man-Cho So, Yinyu Ye
ICIP
2002
IEEE
14 years 11 months ago
SPIN-IT: a data centric routing protocol for image retrieval in wireless networks
In this paper, we propose and analyze a routing protocol for mobile ad hoc networks that supports efficient image retrieval based on metadata queries. In digital photography, meta...
Edward Woodrow, Wendi Rabiner Heinzelman
ICC
2009
IEEE
168views Communications» more  ICC 2009»
14 years 4 months ago
Degrees of Freedom of Cooperative MIMO in Cellular Networks
— In cellular networks, relays and/or mobiles can cooperate to improve the overall system performance. For example, once the transmission from a base station with multiple antenn...
Si-Hyeon Lee, Sae-Young Chung