Sciweavers

WICON
2008
13 years 10 months ago
An experimental study on connectivity and topology control in real multi-hop wireless networks
Topology control by means of transmit power adjustment is a well-studied technique for improving the network capacity and energy efficiency of wireless ad hoc networks. In this pa...
Alvin C. Valera, Pius W. Q. Lee, Yew Fai Wong, Win...
WICON
2008
13 years 10 months ago
Risk-aware beacon scheduling for tree-based ZigBee/IEEE 802.15.4 wireless networks
In a tree-based ZigBee network, ZigBee routers (ZRs) must schedule their beacon transmission times to avoid beacon collisions. The beacon schedule determines packet delivery laten...
Li-Hsing Yen, Yee Wei Law, Marimuthu Palaniswami
WICON
2008
13 years 10 months ago
A negotiation game for multichannel access in cognitive radio networks
We consider the problem of efficient opportunistic spectrum access in cognitive radio networks where there are multiple secondary users trying to share access to multiple channels...
Hua Liu, Longbo Huang, Bhaskar Krishnamachari, Qin...
WICON
2008
13 years 10 months ago
Seamless content delivery
Widespread and affordable broadband access opens up opportunities for delivery of new streaming services. However, what is expected to fundamentally change the way that people use...
Theodore Zahariadis, George Leoleis, Thomas Schier...
WICON
2008
13 years 10 months ago
Towards distributed network classification for mobile ad hoc networks
Mobile ad hoc networks range from traditional MANETs where end-to-end paths exist from sources to destinations, to DTNs where no contemporaneous end-to-end paths exist and communi...
Dimitrios Antonellis, Ahmed Mansy, Konstantinos Ps...
WICON
2008
13 years 10 months ago
Design and deployment considerations for high performance MIMO testbeds
Konstantinos Pelechrinis, Ioannis Broustis, Theodo...
WICON
2008
13 years 10 months ago
Programming in mobile ad hoc networks
The possibility for spontaneous ad hoc networks between mobile devices has been increasing as small devices become more capable of hosting useful networked applications. These app...
Justin Collins, Rajive Bagrodia
WICON
2008
13 years 10 months ago
Security vulnerabilities in IEEE 802.22
Cognitive Radio (CR) is seen as one of the enabling technologies for realizing a new spectrum access paradigm, viz. Opportunistic Spectrum Sharing (OSS). IEEE 802.22 is the world&...
Kaigui Bian, Jung Min Park
WICON
2008
13 years 10 months ago
Game-based admission control for wireless systems
Much previous work has examined the wireless power control problem using tools from game theory, an economic concept which describes the behavior of interdependent but non-coopera...
Benjamin Yolken, Nicholas Bambos
WICON
2008
13 years 10 months ago
A graph based routing algorithm for multi-hop cognitive radio networks
Cognitive radio networks that allow dynamic spectrum access are considered spectrally more efficient than networks using fixed spectral allocation. These networks are characterize...
Yogesh Reddy Kondareddy, Prathima Agrawal