Sciweavers

504 search results - page 50 / 101
» The Improvement of YSYCT Scheme for Imbalanced Wireless Netw...
Sort
View
ICASSP
2010
IEEE
13 years 7 months ago
Joint bandwidth and power allocation in wireless multi-user decode-and-forward relay networks
The resource allocation problem in wireless multi-user decode-and-forward (DF) relay networks is considered. The conventional resource allocation schemes based on the equal distri...
Xiaowen Gong, Sergiy A. Vorobyov, Chintha Tellambu...
VTC
2008
IEEE
158views Communications» more  VTC 2008»
14 years 2 months ago
A Novel Load Balanced and Lifetime Maximization Routing Protocol in Wireless Sensor Networks
Abstract— Balancing energy consumption and prolonging network lifetime are open challenges in Wireless Sensor Networks. In this paper, we design a novel load balanced routing pro...
Chengjie Wu, Ruixi Yuan, Hongchao Zhou
MOBICOM
2009
ACM
14 years 2 months ago
Order matters: transmission reordering in wireless networks
Modern wireless interfaces support a physical layer capability called Message in Message (MIM). Briefly, MIM allows a receiver to disengage from an ongoing reception, and engage ...
Justin Manweiler, Naveen Santhapuri, Souvik Sen, R...
PIMRC
2010
IEEE
13 years 5 months ago
On the feasibility of receive collaboration in wireless sensor networks
In this paper, a new type of collaboration in wireless sensor networks (WSN) is suggested that exploits array processing algorithms for better reception of a signal. For receive co...
Behnam Banitalebi, S. Sigg, M. Beigl
JDCTA
2010
150views more  JDCTA 2010»
13 years 2 months ago
Provable Password-Authenticated Key Exchange Protocol against Imposter Attack on Ad Hoc Networks
In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encrypted Key Exchange (EKE) protocol against offline dictionary attacks using both ...
Ang Gao