Sciweavers

2691 search results - page 507 / 539
» Security in Ad Hoc Networks
Sort
View
WINET
2010
91views more  WINET 2010»
13 years 8 months ago
Route duration modeling for mobile ad-hoc networks
In this paper, we present a model that estimates the time duration of routes formed by several intermediate nodes in mobile multi-hop ad-hoc networks. First, we analyze a 3-node ro...
Michael Pascoe-Chalke, Javier Gomez, Victor Rangel...
DIALM
2010
ACM
194views Algorithms» more  DIALM 2010»
13 years 7 months ago
Prioritized gossip in vehicular networks
We present a method for using real world mobility traces to identify tractable theoretical models for the study of distributed algorithms in mobile networks. We validate the metho...
Alejandro Cornejo, Calvin C. Newport
MOBICOM
2006
ACM
14 years 3 months ago
Characterizing multi-way interference in wireless mesh networks
Wireless mesh networks (WMNs) have been proposed as a solution for ubiquitous last-mile broadband access. A critical limiting factor for many WMN protocols in realizing their thro...
Saumitra M. Das, Dimitrios Koutsonikolas, Y. Charl...
JSAC
2008
254views more  JSAC 2008»
13 years 9 months ago
Cross-Layer Based Opportunistic MAC Protocols for QoS Provisionings Over Cognitive Radio Wireless Networks
We propose the cross-layer based opportunistic multi-channel medium access control (MAC) protocols, which integrate the spectrum sensing at physical (PHY) layer with the packet sch...
Hang Su, Xi Zhang
RTSS
2006
IEEE
14 years 3 months ago
Design of Location Service for a Hybrid Network of Mobile Actors and Static Sensors
Location services are essential to many applications running on a hybrid of wirelessly-networked mobile actors and static sensors, such as surveillance systems and the Pursuer and...
Zhigang Chen, Min Gyu Cho, Kang G. Shin