Sciweavers

17932 search results - page 109 / 3587
» Wireless communications systems
Sort
View
196
Voted
INFOCOM
2003
IEEE
15 years 9 months ago
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks
Abstract— As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad ho...
Yih-Chun Hu, Adrian Perrig, David B. Johnson
ICC
2009
IEEE
166views Communications» more  ICC 2009»
15 years 10 months ago
A Cross-Layer Perspective on Rateless Coding for Wireless Channels
Abstract—Rateless coding ensures reliability by providing everincreasing redundancy, traditionally at the packet level (i.e. the application layer) through erasure coding. This p...
Thomas A. Courtade, Richard D. Wesel
133
Voted
INFOCOM
2007
IEEE
15 years 10 months ago
Non-Cooperative Multi-Radio Channel Allocation in Wireless Networks
— Channel allocation was extensively studied in the framework of cellular networks. But the emergence of new system concepts, such as cognitive radio systems, has brought this to...
Márk Félegyházi, Mario Cagalj...
131
Voted
MOBICOM
2000
ACM
15 years 8 months ago
Sending messages to mobile users in disconnected ad-hoc wireless networks
An ad-hoc network is formed by a group of mobile hosts upon a wireless network interface. Previous research in this area has concentrated on routing algorithms which are designed ...
Qun Li, Daniela Rus
123
Voted
CEC
2007
IEEE
15 years 7 months ago
A memetic algorithm for dynamic design of wireless sensor Networks
We present a memetic algorithm that dynamically optimizes the design of a wireless sensor network towards energy conservation and extension of the life span of the network, taking ...
Konstantinos P. Ferentinos, Theodore A. Tsiligirid...