Sciweavers

1458 search results - page 207 / 292
» Simulation of transport protocols over wireless communicatio...
Sort
View
MOBICOM
2009
ACM
14 years 2 months ago
Opportunistic flooding in low-duty-cycle wireless sensor networks with unreliable links
Intended for network-wide dissemination of commands, configurations and code binaries, flooding has been investigated extensively in wireless networks. However, little work has ...
Shuo Guo, Yu Gu, Bo Jiang, Tian He
GLOBECOM
2007
IEEE
14 years 2 months ago
A Group of People Acts like a Black Body in a Wireless Mesh Network
Abstract— A Wireless Mesh Network (WMN) is being considered for commercial use in spite of several unaddressed issues. In this paper we focus on one of the most critical issues: ...
Sachin Lal Shrestha, Anseok Lee, Jinsung Lee, Dong...
MASCOTS
2001
13 years 9 months ago
Parameterized Mobile Action Generator for a Wireless PCS Network
While there are different research groups in the mobile computing community, most research requires mobile action data in terms of user calling and mobility patterns. Since collec...
Sang-Eon Park, Carla N. Purdy
IJNSEC
2011
232views more  IJNSEC 2011»
13 years 2 months ago
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significan...
Garth V. Crosby, Lance Hester, Niki Pissinou
MSWIM
2009
ACM
14 years 2 months ago
How do wireless chains behave?: the impact of MAC interactions
In a Multi-hop Wireless Networks (MHWN), packets are routed between source and destination using a chain of intermediate nodes; chains are a fundamental communication structure in...
Saquib Razak, Vinay Kolar, Nael B. Abu-Ghazaleh, K...