Sciweavers

432 search results - page 76 / 87
» Topology Control for Constant Rate Mobile Networks
Sort
View
INFOCOM
2010
IEEE
13 years 7 months ago
Castor: Scalable Secure Routing for Ad Hoc Networks
—Wireless ad hoc networks are inherently vulnerable, as any node can disrupt the communication of potentially any other node in the network. Many solutions to this problem have b...
Wojciech Galuba, Panos Papadimitratos, Marcin Potu...
COMCOM
2006
213views more  COMCOM 2006»
13 years 8 months ago
Energy efficient information dissemination protocols by negotiation for wireless sensor networks
In this paper we consider a distributed and efficient information dissemination and retrieval system for wireless sensor networks. In such a system each sensor node operates auton...
Dandan Liu, Xiaodong Hu, Xiaohua Jia
EUC
2005
Springer
14 years 2 months ago
PULSE: A MAC Protocol for RFID Networks
1 The reader collision problem occurs when the signal from one reader interferes with the signal from other readers. Solutions like RTS-CTS are not applicable because a reader may ...
Shailesh M. Birari, Sridhar Iyer
TELETRAFFIC
2007
Springer
14 years 2 months ago
Is ALOHA Causing Power Law Delays?
Abstract. Renewed interest in ALOHA-based Medium Access Control (MAC) protocols stems from their proposed applications to wireless ad hoc and sensor networks that require distribut...
Predrag R. Jelenkovic, Jian Tan
CORR
2010
Springer
197views Education» more  CORR 2010»
13 years 7 months ago
Hedonic Coalition Formation for Distributed Task Allocation among Wireless Agents
—Autonomous wireless agents such as unmanned aerial vehicles, mobile base stations, or self-operating wireless nodes present a great potential for deployment in next-generation w...
Walid Saad, Zhu Han, Tamer Basar, Mérouane ...