Sciweavers

SECON
2008
IEEE
14 years 6 months ago
On the Pitfalls of High-Throughput Multicast Metrics in Adversarial Wireless Mesh Networks
—Recent work in multicast routing for wireless mesh networks has focused on metrics that estimate link quality to maximize throughput. Nodes must collaborate in order to compute ...
Jing Dong, Reza Curtmola, Cristina Nita-Rotaru
SECON
2008
IEEE
14 years 6 months ago
Congestion Control and Channel Assignment in Multi-Radio Wireless Mesh Networks
— We address the problem of congestion control in multi-radio, multi-channel, wireless mesh networks. Compared to its single radio counterpart for which solutions exist, this pro...
Anastasios Giannoulis, Theodoros Salonidis, Edward...
SECON
2008
IEEE
14 years 6 months ago
Scheduling and Dynamic Relocation for IEEE 802.11s Mesh Deterministic Access
—Deployment of Wireless Mesh Networks (WMNs) is becoming increasingly popular due to the low-impact and lowcost features of wireless devices. This is especially true for WMNs bas...
Claudio Cicconetti, Luciano Lenzini, Enzo Mingozzi
SECON
2008
IEEE
14 years 6 months ago
Congestion-Aware Rate Adaptation in Wireless Networks: A Measurement-Driven Approach
—Traditional rate adaptation solutions for IEEE 802.11 wireless networks perform poorly in congested networks. Measurement studies show that congestion in a wireless network lead...
Prashanth Aravinda Kumar Acharya, Ashish Sharma, E...
SECON
2008
IEEE
14 years 6 months ago
Decentralized Tick Synchronization for Multi-Hop Medium Slotting in Wireless Ad Hoc Networks Using Black Bursts
—In this paper, we present Black Burst Synchronization (BBS)1 , a novel protocol for decentralized network-wide tick synchronization in wireless ad hoc networks, located at MAC l...
Reinhard Gotzhein, Thomas Kuhn
SECON
2008
IEEE
14 years 6 months ago
Practical Algorithms for Gathering Stored Correlated Data in a Network
—Many sensing systems remotely monitor/measure an environment at several sites, and then report these observations to a central site. We propose and investigate several practical...
Ramin Khalili, James F. Kurose
SECON
2008
IEEE
14 years 6 months ago
SYNAPSE: A Network Reprogramming Protocol for Wireless Sensor Networks Using Fountain Codes
—Wireless reprogramming is a key functionality in Wireless Sensor Networks (WSNs). In fact, the requirements for the network may change in time, or new parameters might have to b...
Michele Rossi, Giovanni Zanca, Luca Stabellini, Ri...
SECON
2008
IEEE
14 years 6 months ago
A Three-Tier Framework for Intruder Information Sharing in Sensor Networks
—In sensor networks, an intruder (i.e., compromised node) identified and isolated in one place can be relocated and/or duplicated to other places to continue attacks; hence, det...
Bin Tong, Santosh Panchapakesan, Wensheng Zhang
SECON
2008
IEEE
14 years 6 months ago
Predictive or Oblivious: A Comparative Study of Routing Strategies for Wireless Mesh Networks under Uncertain Demand
—Traffic routing plays a critical role in determining the performance of a wireless mesh network. To investigate the best solution, existing work proposes to formulate the mesh ...
Jonathan Wellons, Liang Dai, Yuan Xue, Yi Cui
SECON
2008
IEEE
14 years 6 months ago
Understanding Radio Irregularity in Wireless Networks
— In an effort to better understand connectivity and capacity in wireless networks, the log-normal shadowing radio propagation model is used to capture radio irregularities and o...
Torsten Muetze, Patrick Stuedi, Fabian Kuhn, Gusta...