Sciweavers

101 search results - page 6 / 21
» Tree Based Flooding Protocol for Multi-hop Wireless Networks
Sort
View
INFOCOM
2006
IEEE
14 years 23 days ago
Efficient Flooding Scheme Based on 1-Hop Information in Mobile Ad Hoc Networks
—Flooding is one of the most fundamental operations in mobile ad hoc networks. Traditional implementation of flooding suffers from the problems of excessive redundancy of message...
Hai Liu, Peng-Jun Wan, Xiaohua Jia, Xinxin Liu, F....
WIMOB
2009
IEEE
14 years 1 months ago
Interference across Multi-hop Wireless Chains
—Chains or multi-hop paths are the fundamental communication structure in Multi-Hop Wireless Networks. Understanding chain behavior is critical in order to build effective higher...
Vinay Kolar, Saquib Razak, Nael B. Abu-Ghazaleh, P...
SENSYS
2006
ACM
14 years 21 days ago
RBP: robust broadcast propagation in wireless networks
Varying interference levels make broadcasting an unreliable operation in low-power wireless networks. Many routing and resource discovery protocols depend on flooding (repeated pe...
Fred Stann, John S. Heidemann, Rajesh Shroff, Muha...
CONEXT
2005
ACM
13 years 8 months ago
MRS: a simple cross-layer heuristic to improve throughput capacity in wireless mesh networks
Wireless Mesh Networks (WMNs) are an emerging architecture based on multi-hop transmission. ISPs considers WMNs as a potential future technology to offer broadband Internet acces...
Luigi Iannone, Serge Fdida
PERCOM
2006
ACM
14 years 6 months ago
Authenticated Query Flooding in Sensor Networks
Abstract. We propose a novel mechanism for authentication of queries in a sensor network in case these queries are flooded. In our protocol, the base station appends an authenticat...
Zinaida Benenson, Lexi Pimenidis, Felix C. Freilin...