Sciweavers

1373 search results - page 213 / 275
» Self-securing ad hoc wireless networks
Sort
View
TCOM
2008
120views more  TCOM 2008»
13 years 8 months ago
Network Coding for Efficient Multicast Routing in Wireless Ad-hoc Networks
Network coding is a powerful coding technique that has been proved to be very effective in achieving the maximum multicast capacity. It is especially suited for new emerging networ...
Jingyao Zhang, Pingyi Fan, Khaled Ben Letaief
NETGAMES
2003
ACM
14 years 2 months ago
Experiences using a dual wireless technology infrastructure to support ad-hoc multiplayer games
Multiplayer games for mobile wireless devices are becoming increasingly popular. Many modern devices such as PDAs or mobile telephones are equipped with Bluetooth interfaces. Blue...
Hartmut Ritter, Thiemo Voigt, Min Tian, Jochen H. ...
BROADNETS
2007
IEEE
14 years 3 months ago
Cross-layer optimization made practical
Abstract— Limited resources and time-varying nature of wireless ad hoc networks demand optimized use of resources across layers. Cross-layer optimization (CLO) for wireless netwo...
Ajit Warrier, Long Le, Injong Rhee
COMCOM
2006
114views more  COMCOM 2006»
13 years 9 months ago
A comparison of epidemic algorithms in wireless sensor networks
We consider the problem of reliable data dissemination in the context of wireless sensor networks. For some application scenarios, reliable data dissemination to all nodes is nece...
Mert Akdere, Cemal Çagatay Bilgin, Ozan Ger...
INFOCOM
2009
IEEE
14 years 3 months ago
Exact Analysis of Latency of Stateless Opportunistic Forwarding
Abstract—Stateless opportunistic forwarding is a simple faulttolerant distributed approach for data delivery and information querying in wireless ad hoc networks, where packets a...
Chi-Kin Chau, Prithwish Basu