Sciweavers

771 search results - page 15 / 155
» Wireless Network Information Flow: A Deterministic Approach
Sort
View
CAISE
2003
Springer
14 years 22 days ago
A Specification Approach to Compose Mobile Web Services Using Service Chart Diagrams
We present our work on composing mobile Web services, denoted by M-services, in the wireless world. The wireless world has its own features that make it completely different from t...
Zakaria Maamar, Mohammed Lahkim
MOBICOM
1999
ACM
14 years 1 months ago
Optimizing the End-to-End Performance of Reliable Flows Over Wireless Links
We present the results of a performance evaluation of link layer error recovery over wireless links. Our analysis is based upon a case study of the circuit-switched data service i...
Reiner Ludwig, Almudena Konrad, Anthony D. Joseph
GLOBECOM
2008
IEEE
13 years 9 months ago
Maximum-Lifetime Coding Subgraph for Multicast Traffic in Wireless Sensor Networks
It has been shown that network coding can lead to significant improvement in network capacity and reduction in power consumption for multicast traffic in wireless networks. In this...
Vahid Shah-Mansouri, Vincent W. S. Wong
COMCOM
2008
148views more  COMCOM 2008»
13 years 9 months ago
TCP fairness issues in IEEE 802.11 wireless LANs
In this paper, we study several TCP fairness issues in wireless local networks, both experimentally and via simulation. We illustrate the unfairness problems caused by the 802.11 ...
Qian Wu, Mingwei Gong, Carey L. Williamson
JSAC
2010
188views more  JSAC 2010»
13 years 3 months ago
Random-walk based approach to detect clone attacks in wireless sensor networks
Abstract--Wireless sensor networks (WSNs) deployed in hostile environments are vulnerable to clone attacks. In such attack, an adversary compromises a few nodes, replicates them, a...
Yingpei Zeng, Jiannong Cao, Shigeng Zhang, Shanqin...