Sciweavers

1373 search results - page 82 / 275
» Self-securing ad hoc wireless networks
Sort
View
ANSS
2004
IEEE
13 years 11 months ago
A Spatial Analysis of Mobility Models: Application to Wireless Ad Hoc Network Simulation
We quantatively analyze the differences between a realistic mobility model, TRANSIMS, and several synthetic mobility models. New synthetic models were created by modifying the sta...
D. Charles Engelhart, Anand Sivasubramaniam, Chris...
ICC
2007
IEEE
175views Communications» more  ICC 2007»
14 years 2 months ago
Adaptive Range-Based Power Control for Collision Avoidance in Wireless Ad Hoc Networks
—The paper analyzes the relationships among the transmission range, carrier sensing range, and interference range in case that power control is adopted and proposes an adaptive r...
Kuei-Ping Shih, Yen-Da Chen, Chau-Chieh Chang
WOWMOM
2006
ACM
135views Multimedia» more  WOWMOM 2006»
14 years 1 months ago
A MAC Layer Protocol for Priority-based Reliable Multicast in Wireless Ad Hoc Networks
RTS-CTS handshake based protocols achieve “reliable unicast” by eliminating the hidden node problem effectively, however, these solutions are not directly or efficiently gene...
Murat Demirbas, Muzammil Hussain
IPPS
2002
IEEE
14 years 19 days ago
Distributed Spanner with Bounded Degree for Wireless Ad Hoc Networks
In this paper, we propose a new distributed algorithm that constructs a sparse spanner subgraph of the unit disk graph efficiently for wireless ad hoc networks. It maintains a li...
Yu Wang 0003, Xiang-Yang Li
TC
2008
13 years 7 months ago
Iterative Local Solutions for Connected Dominating Set in Ad Hoc Wireless Networks
We propose a general framework of the iterative local solution (ILS) for computing a connected dominating set (CDS) in ad hoc wireless networks, which include wireless sensor netwo...
Jie Wu, Fei Dai, Shuhui Yang