Sciweavers

1458 search results - page 200 / 292
» Simulation of transport protocols over wireless communicatio...
Sort
View
MACOM
2010
13 years 2 months ago
On the Performance of Single LDGM Codes for Iterative Data Fusion over the Multiple Access Channel
One of the applications of wireless sensor networks currently undergoing active research focuses on the scenario where the information generated by a data source S is simultaneousl...
Javier Del Ser, Javier Garcia-Frias, Pedro M. Cres...
ADHOCNOW
2008
Springer
14 years 2 months ago
Adapting BitTorrent to Wireless Ad Hoc Networks
Abstract. BitTorrent is one of the Internet’s most efficient content distribution protocols. It is known to perform very well over the wired Internet where end-to-end performance...
Mohamed Karim Sbai, Chadi Barakat, Jaeyoung Choi, ...
HOLOMAS
2009
Springer
14 years 16 days ago
Mobility Model for Tactical Networks
In this paper a synthetic mobility model which represents behavior and movement pattern of heterogeneous units in disaster relief and battlefield scenarios is proposed. These oper...
Milan Rollo, Antonín Komenda
ICC
2007
IEEE
112views Communications» more  ICC 2007»
14 years 2 months ago
A Collision-free Based Rotational Listening Strategy (RLS) for IEEE 802.15.4 WPAN
— The standard IEEE 802.15.4 medium access control (MAC) protocol is designed for low-power transmissions in low-rate and short-distance wireless personal area networks (WPANs). ...
Shiann-Tsong Sheu, Yun-Yen Shih
ICC
2007
IEEE
354views Communications» more  ICC 2007»
14 years 2 months ago
Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad Hoc Networks
– As mobile wireless ad hoc networks have different characteristics from wired networks and even from standard wireless networks, there are new challenges related to security iss...
Nidal Nasser, Yunfeng Chen