Sciweavers

814 search results - page 37 / 163
» Solutions to Hidden Terminal Problems in Wireless Networks
Sort
View
PERCOM
2005
ACM
14 years 8 months ago
Securing Wireless Networks in a University Environment
Many applications in eLearning utilize wireless networks (WLAN) as a carrier for data and communication. These networks in their basic form are insecure, protecting the communicat...
Jochen Eisinger, Peter Winterer, Bernd Becker
ICPADS
2006
IEEE
14 years 2 months ago
Optimal Movement-Assisted Sensor Deployment and Its Extensions in Wireless Sensor Networks
In wireless sensor networks (WSNs), a good sensor deployment method is vital to the quality of service (QoS) provided by WSNs. This QoS depends on the coverage of the monitoring a...
Jie Wu, Shuhui Yang
IPCCC
2007
IEEE
14 years 2 months ago
Detecting Misused Keys in Wireless Sensor Networks
Key management is the cornerstone for secure communication in sensor networks. Researchers have recently developed many techniques to setup pairwise keys between sensor nodes. How...
Donggang Liu, Qi Dong
MOBIHOC
2004
ACM
14 years 1 months ago
Antenna orientation optimization for minimum-energy multicast tree construction in wireless ad hoc networks with directional ant
Energy conservation is a critical issue in wireless ad hoc networks since batteries are the only energy source to power the nodes. One major metric for energy conservation is to r...
Song Guo, Oliver W. W. Yang
MMNS
2003
135views Multimedia» more  MMNS 2003»
13 years 9 months ago
Pervasive Accounting of Resource Consumption for Wireless Services with Adaptive QoS
Wireless communications and device miniaturization are enabling pervasive scenarios where the limited resource availability and the wide heterogeneity of access terminals make cruc...
Paolo Bellavista, Antonio Corradi, Silvia Vecchi