Sciweavers

INFOCOM
2012
IEEE
12 years 1 months ago
Capacity of distributed content delivery in large-scale wireless ad hoc networks
—In most existing wireless networks, end users obtain data content from the wired network, typically, the Internet. In this manner, virtually all of their traffic must go throug...
Wang Liu, Kejie Lu, Jianping Wang, Yi Qian, Tao Zh...
INFOCOM
2011
IEEE
13 years 2 months ago
Contrabass: Concurrent transmissions without coordination for ad hoc networks
—A practical protocol jointly considering PHY and MAC for MIMO based concurrent transmissions in wireless ad hoc networks, called Contrabass, is presented. Concurrent transmissio...
Sungro Yoon, Injong Rhee, Bang Chul Jung, Babak Da...
CEE
2011
106views more  CEE 2011»
13 years 3 months ago
LLACA: An adaptive localized clustering algorithm for wireless ad hoc networks
  Performance  of  ad  hoc  networks  dramatically  declines  as  network  grows.  Cluster  formation  in  which  the  network  hosts  are  hierarchically  part...
Javad Akbari Torkestani, Mohammad Reza Meybodi
ICASSP
2011
IEEE
13 years 3 months ago
Interference alignment in clustered ad hoc networks: High reliability regime and per-cluster aloha
Wireless networks are fundamentally limited by the intensity of the received signals and the mutual interference caused by many concurrent transmissions. We consider large wireles...
Roland Tresch, Giusi Alfano, Maxime Guillaud
TWC
2010
13 years 6 months ago
Channel Diversity in Random Wireless Networks
The goal of this paper is to explore the benefits of channel diversity in wireless ad hoc networks. Our model is that of a Poisson point process of transmitters, each with a recei...
Kostas Stamatiou, John G. Proakis, James R. Zeidle...
TWC
2010
13 years 6 months ago
Sharp thresholds for relative neighborhood graphs in wireless Ad Hoc networks
In wireless ad hoc networks, relative neighborhood graphs (RNGs) are widely used for topology control. If every node has the same transmission radius, then an RNG can be locally co...
Chih-Wei Yi, Peng-Jun Wan, Lixin Wang, Chao-Min Su
JDCTA
2010
150views more  JDCTA 2010»
13 years 6 months ago
Provable Password-Authenticated Key Exchange Protocol against Imposter Attack on Ad Hoc Networks
In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encrypted Key Exchange (EKE) protocol against offline dictionary attacks using both ...
Ang Gao
TCOM
2011
183views more  TCOM 2011»
13 years 6 months ago
Multi-Antenna Communication in Ad Hoc Networks: Achieving MIMO Gains with SIMO Transmission
—The benefit of multi-antenna receivers is investigated in wireless ad hoc networks, and the main finding is that network throughput can be made to scale linearly with the numb...
Nihar Jindal, Jeffrey G. Andrews, Steven Weber
SCN
2011
Springer
348views Communications» more  SCN 2011»
13 years 6 months ago
MANET QoS support without reservations
An inelastic flow is a flow with inelastic rate: i.e., the rate is fixed, it cannot be dynamically adjusted to traffic and load condition as in elastic flows like TCP. Real ti...
Soon-Young Oh, Gustavo Marfia, Mario Gerla
ADHOC
2010
135views more  ADHOC 2010»
13 years 6 months ago
Efficient broadcast for wireless ad hoc networks with a realistic physical layer
In this paper, we investigate the low coverage problem of efficient broadcast protocols in wireless ad hoc networks with realistic physical layer models. To minimize energy consum...
Hui Xu, J. J. Garcia-Luna-Aceves