Sciweavers

1373 search results - page 101 / 275
» Self-securing ad hoc wireless networks
Sort
View
TMC
2008
152views more  TMC 2008»
13 years 7 months ago
CDR-MAC: A Protocol for Full Exploitation of Directional Antennas in Ad Hoc Wireless Networks
In this paper, we propose a new Medium Access Control (MAC) protocol for full exploitation of directional antennas in wireless networks. The protocol introduces a circular directio...
Thanasis Korakis, Gentian Jakllari, Leandros Tassi...
TMC
2008
161views more  TMC 2008»
13 years 7 months ago
A New MAC Scheme Supporting Voice/Data Traffic in Wireless Ad Hoc Networks
Abstract--In wireless ad hoc networks, in addition to the well-known hidden terminal and exposed terminal problems, the locationdependent contention may cause serious unfairness an...
Ping Wang, Hai Jiang, Weihua Zhuang
GLOBECOM
2007
IEEE
14 years 2 months ago
Gaussian Approximations for Carrier Sense Modeling in Wireless Ad Hoc Networks
— Physical carrier sense for wireless multihop networks has attracted a certain degree of attention since it is a simple yet important mechanism for distributed channel access. S...
Francesco Rossetto, Michele Zorzi
ICIP
2006
IEEE
14 years 1 months ago
Multiple Tree Video Multicast Over Wireless Ad Hoc Networks
—In this paper, we propose multiple tree construction schemes and routing protocols for video streaming over wireless ad hoc networks. The basic idea is to split the video into m...
Avideh Zakhor, Wei Wei
MOBIQUITOUS
2005
IEEE
14 years 1 months ago
Defend Against Cache Consistency Attacks in Wireless Ad Hoc Networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, cache consistency issues must be addressed. T...
Wensheng Zhang, Guohong Cao