Sciweavers

1373 search results - page 112 / 275
» Self-securing ad hoc wireless networks
Sort
View
PERCOM
2005
ACM
14 years 7 months ago
Understanding the real behavior of Mote and 802.11 ad hoc networks: an experimental approach
IEEE 802.11 and Mote devices are today two of the most interesting wireless technologies for ad hoc and sensor networks respectively, and many efforts are currently devoted to und...
Giuseppe Anastasi, Eleonora Borgia, Marco Conti, E...
GLOBECOM
2008
IEEE
14 years 2 months ago
Antenna Selection Diversity Based MAC Protocol for MIMO Ad Hoc Wireless Networks
— In this paper, we propose a novel asynchronous Media Access Control (MAC) protocol, Opportunistic MAC (OMAC), for Multiple Input Multiple Output (MIMO) ad-hoc networks. The pro...
Abhijeet Bhorkar, B. S. Manoj, Bhaskar D. Rao, Ram...
GLOBECOM
2008
IEEE
14 years 2 months ago
Routing with Probabilistic Delay Guarantees in Wireless Ad-Hoc Networks
—In many wireless ad-hoc networks it is important to find a route that delivers a message to the destination within a certain deadline (delay constraint). We propose to identify...
Matthew Brand, Petar Maymounkov, Andreas F. Molisc...
ADHOCNOW
2005
Springer
14 years 1 months ago
Reed-Solomon and Hermitian Code-Based Scheduling Protocols for Wireless Ad Hoc Networks
Abstract. In this work we investigate bounds on throughput and delay performance of a scheduling protocol that derives its decisions from codes traditionally used to correct or det...
Carlos H. Rentel, Thomas Kunz
IJNSEC
2008
132views more  IJNSEC 2008»
13 years 7 months ago
Optimal Energy-Delay Routing Protocol with Trust Levels for Wireless Ad Hoc Networks
This paper presents the Trust Level Routing (TLR) protocol, an extension of the optimized energy-delay routing (OEDR) protocol, focusing on the integrity, reliability and survivab...
Eyad Taqieddin, S. Jagannathan, Ann Miller