In our work we present a new approach to the problem of channel assignment in Wireless Ad Hoc Network. We introduce a new algorithm which works in distributed model of computations...
—Malware attacks constitute a serious security risk that threatens to slow down the large scale proliferation of wireless applications. As a first step towards thwarting this se...
This paper addresses fault-tolerant topology control in a heterogeneous wireless sensor network consisting of several resource-rich supernodes, used for data relaying, and a large...
Vehicular Ad Hoc Networks (VANET) have several characteristics that distinguish them from other ad hoc networks. Among those is the rapid change in topology due to traffic jams, w...
Maen M. Artimy, William Robertson, William J. Phil...
Connectivity in mobile wireless ad-hoc networks is maintained by setting the transmission range so that a node can establish a link to any other node in the network either directl...
Maen M. Artimy, William J. Phillips, William Rober...
In wireless sensor networks, the coarse grained localization is a method to compute the position of randomly distributed sensor nodes. Without optimizations, it provides low preci...
Frank Reichenbach, Jan Blumenthal, Dirk Timmermann
Abstract. Over the last years, research efforts have led the way to embed computation into the environment. Much attention is drawn to technologies supporting dynamicity and mobil...
— Broadcast protocols play a vital role in multihop wireless networks. Due to the broadcast nature of radio signals, a node’s interference range can be larger than its transmis...
Abstract— Understanding link statistics in mobile ad hoc networks (MANETs) is essential to design adaptive routing protocols and achieve desired network performance. While much a...
— In an effort to better understand connectivity and capacity in wireless networks, the log-normal shadowing radio propagation model is used to capture radio irregularities and o...
Torsten Muetze, Patrick Stuedi, Fabian Kuhn, Gusta...