Sciweavers

1373 search results - page 140 / 275
» Self-securing ad hoc wireless networks
Sort
View
WIOPT
2005
IEEE
14 years 2 months ago
Interference Power Sum with Log-Normal Components in Ad-Hoc and Sensor Networks
The log-normal shadowing radio model has frequently been used to model radio propagation conditions. There exist accurate calculation methods for estimation of interference power ...
Ramin Hekmat, Piet Van Mieghem

Lecture Notes
456views
15 years 7 months ago
Wireless and Mobile Networking
The lecture notes cover the following topics, CSE 574S Wireless and Mobile Networking: Course Overview, Wireless Networking Trends, A Review of Key Wireless Physical Layer Co...
Raj Jain
BROADNETS
2004
IEEE
14 years 25 days ago
MOAR: A Multi-Channel Opportunistic Auto-Rate Media Access Protocol for Ad Hoc Networks
The IEEE 802.11 wireless media standard supports multiple frequency channels as well as multiple data rates at the physical (PHY) layer. Moreover, various auto rate adaptation mec...
Vikram Kanodia, Ashutosh Sabharwal, Edward W. Knig...
MSWIM
2003
ACM
14 years 2 months ago
On the application of traffic engineering over bluetooth ad hoc networks
The seamless communication of data and voice over short-range, point-to-multipoint wireless links between mobile and/or stationary devices is becoming a reality by newly introduce...
Sachin Abhyankar, Rishi Toshniwal, Carlos de M. Co...
LCN
2003
IEEE
14 years 2 months ago
Improving Multicast Tree Construction in Static Ad Hoc Networks
We consider wireless multicast tree construction for energy efficiency. We introduce a novel algorithm, Incremental Shortest Path Tree (ISPT), to generate source-based multicast ...
Aleksi Penttinen, Jorma T. Virtamo