Sciweavers

13007 search results - page 2339 / 2602
» Wireless and Mobile Networking
Sort
View
132
Voted
SPAA
2010
ACM
15 years 8 months ago
Securing every bit: authenticated broadcast in radio networks
This paper studies non-cryptographic authenticated broadcast in radio networks subject to malicious failures. We introduce two protocols that address this problem. The first, Nei...
Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zark...
150
Voted
DMSN
2007
ACM
15 years 7 months ago
Similarity-aware query allocation in sensor networks with multiple base stations
In this paper, we consider a large scale sensor network comprising multiple, say K, base stations and a large number of wireless sensors. Such an infrastructure is expected to be ...
Shili Xiang, Hock-Beng Lim, Kian-Lee Tan, Yongluan...
153
Voted
WCNC
2010
IEEE
15 years 7 months ago
Differentiable Spectrum Partition for Fractional Frequency Reuse in Multi-Cell OFDMA Networks
To mitigate inter-cell interference (ICI) and achieve higher spectrum efficiency, fractional frequency reuse (FFR) has been widely adopted by the next generation wireless systems...
Weihuang Fu, Zhifeng Tao, Jinyun Zhang, Dharma P. ...
128
Voted
CORR
2010
Springer
143views Education» more  CORR 2010»
15 years 3 months ago
Connectivity in Sub-Poisson Networks
: We consider a class of point processes, which we call sub-Poisson; these are point processes that can be directionallyconvexly (dcx) dominated by some Poisson point process. The ...
Bartlomiej Blaszczyszyn, D. Yogeshwaran
134
Voted
TC
2008
15 years 3 months ago
An Energy-Delay Tunable Task Allocation Strategy for Collaborative Applications in Networked Embedded Systems
Collaborative applications with energy and low-delay constraints are emerging in various networked embedded systems like wireless sensor networks and multimedia terminals. Conventi...
Tao Xie 0004, Xiao Qin
« Prev « First page 2339 / 2602 Last » Next »