default search action
9th MobiHoc 2008: Hong Kong, China
- Xiaohua Jia, Ness B. Shroff, Peng-Jun Wan:
Proceedings of the 9th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2008, Hong Kong, China, May 26-30, 2008. ACM 2008, ISBN 978-1-60558-073-9 - Leandros Tassiulas:
Multihop wireless networks: capacity limits and how to approach them. 1-2
Routing and link scheduling I
- Yi Shi, Sushant Sharma, Y. Thomas Hou, Sastry Kompella:
Optimal relay assignment for cooperative communications. 3-12 - Karthikeyan Sundaresan, Sampath Rangarajan:
On exploiting diversity and spatial reuse in relay-enabled wireless networks. 13-22 - Alessandro Mei, Julinda Stefa:
Routing in outer space: fair traffic load in multi-hop wireless networks. 23-32 - Yung Yi, Alexandre Proutière, Mung Chiang:
Complexity in wireless scheduling: impact and tradeoffs. 33-42
Link layer design and rescheduling
- Tie Luo, Mehul Motani, Vikram Srinivasan:
Analyzing DISH for multi-channel MAC protocols in wireless networks. 43-52 - Yanjun Sun, Shu Du, Omer Gurewitz, David B. Johnson:
DW-MAC: a low latency, energy efficient demand-wakeup MAC protocol for wireless sensor networks. 53-62 - Shan Chu, Xin Wang:
Opportunistic and cooperative spatial multiplexing in MIMO ad hoc networks. 63-72 - Predrag R. Jelenkovic, Jian Tan:
Dynamic packet fragmentation for wireless channels with failures. 73-82
Distributed algorithms
- Yiwei Wu, Yingshu Li:
Construction algorithms for k-connected m-dominating sets in wireless sensor networks. 83-90 - Christian Scheideler, Andréa W. Richa, Paolo Santi:
An O(log n) dominating set protocol for wireless ad-hoc networks under the physical interference model. 91-100 - Mirela Damian, Nagesh Javali:
Distributed construction of bounded-degree low-interference spanners of low weight. 101-110 - Changhee Joo:
A local greedy scheduling scheme with provable performance guarantee. 111-120
Scaling laws and fundamental limits I
- Liaoruo Wang, Benyuan Liu, Dennis Goeckel, Donald F. Towsley, Cédric Westphal:
Connectivity in cooperative wireless ad hoc networks. 121-130 - Lixin Wang, Chih-Wei Yi, F. Frances Yao:
Improved asymptotic bounds on critical transmission radius for greedy forward routing in wireless ad hoc networks. 131-138 - Zhenning Kong, Edmund M. Yeh:
On the latency for information dissemination in mobile wireless networks. 139-148
System design and optimization
- Yi Yang, Sencun Zhu, Guohong Cao:
Improving sensor network immunity under worm attacks: a software diversity approach. 149-158 - Bo Sheng, Chiu Chiang Tan, Qun Li, Weizhen Mao:
Finding popular categories for RFID tags. 159-168 - Vinod Namboodiri, Lixin Gao:
Towards energy efficient VoIP over wireless LANs. 169-178
Scaling laws and fundamental limits II
- Zheng Wang, Hamid R. Sadjadpour, Jose Joaquin Garcia-Luna-Aceves:
The capacity and energy efficiency of wireless ad hoc networks with multi-packet reception. 179-188 - XuFei Mao, Xiang-Yang Li, Shaojie Tang:
Multicast capacity for hybrid wireless networks. 189-198 - Petar Momcilovic, Mark S. Squillante:
On throughput in linear wireless networks. 199-208
Routing and link scheduling II
- Wei Cheng, Kai Xing, Xiuzhen Cheng, Xicheng Lu, Zexin Lu, Jinshu Su, Baosheng Wang, Yujun Liu:
Route recovery in vertex-disjoint multipath routing for many-to-one sensor networks. 209-220 - Robert Zhong Zhou, Jun-Hong Cui:
Energy efficient multi-path communication for time-critical applications in underwater sensor networks. 221-230 - Guoliang Xing, Tian Wang, Weijia Jia, Minming Li:
Rendezvous design algorithms for wireless sensor networks with a mobile base station. 231-240
Mobile ad hoc networks
- Pan Hui, Jon Crowcroft, Eiko Yoneki:
Bubble rap: social-based forwarding in delay tolerant networks. 241-250 - Vijay Erramilli, Mark Crovella, Augustin Chaintreau, Christophe Diot:
Delegation forwarding. 251-260 - Marco Fiore, Jérôme Härri:
The networking shape of vehicular mobility. 261-272 - Han Cai, Do Young Eun:
Toward stochastic anatomy of inter-meeting time distribution under general mobility models. 273-282
Game-theoretical aspects
- Xiang-Yang Li, Yanwei Wu, Ping Xu, Guihai Chen, Mo Li:
Hidden information and actions in multi-hop wireless ad hoc networks. 283-292 - Xinyu Zhang, Baochun Li:
Dice: a game theoretic framework for wireless multipath network coding. 293-302 - Lin Gao, Xinbing Wang:
A game approach for multi-channel allocation in multi-hop wireless networks. 303-312 - Juncheng Jia, Qian Zhang:
Competitions and dynamics of duopoly wireless service providers in dynamic spectrum market. 313-322
Communication latency
- Scott C.-H. Huang, Hongwei Du, Eun K. Park:
Minimum-latency gossiping in multi-hop wireless networks. 323-330 - Reza Mahjourian, Feng Chen, Ravi Tiwari, My T. Thai, Hongqiang Zhai, Yuguang Fang:
An approximation algorithm for conflict-aware broadcast scheduling in wireless ad hoc networks. 331-340 - Antonios Skordylis, Niki Trigoni:
Delay-bounded routing in vehicular ad-hoc networks. 341-350 - Cong Liu, Jie Wu:
Routing in a cyclic mobispace. 351-360
Information processing
- Davood Shamsi, Farinaz Koushanfar, Miodrag Potkonjak:
Challenging benchmark for location discovery in ad hoc networks: foundations and applications. 361-370 - Brenton D. Walker:
Using persistent homology to recover spatial information from encounter traces. 371-380 - Murtaza Zafer, Bongjun Ko, Ivan Wang Hei Ho:
Cooperative transmit-power estimation under wireless fading. 381-390 - Emad Soroush, Kui Wu, Jian Pei:
Fast and quality-guaranteed data streaming in resource-constrained sensor networks. 391-400
Sensor coverage and monitoring
- Xiaole Bai, Dong Xuan, Ziqiu Yun, Ten-Hwang Lai, Weijia Jia:
Complete optimal deployment patterns for full-coverage and k-connectivity (k<=6) wireless sensor networks. 401-410 - Benyuan Liu, Olivier Dousse, Jie Wang, Anwar Saipulla:
Strong barrier coverage of wireless sensor networks. 411-420 - Ai Chen, Ten-Hwang Lai, Dong Xuan:
Measuring and guaranteeing quality of barrier-coverage in wireless sensor networks. 421-430 - Dezun Dong, Yunhao Liu, Xiangke Liao:
Self-monitoring for sensor networks. 431-440
Posters
- Salma Ktari, Mathieu Zoubert, Artur Hecker, Houda Labiod:
Symmetric replication for efficient flooding in DHTs. 441-442 - Abdalkarim Awad, Reinhard German, Falko Dressler:
P2P-based routing and data management using the virtual cord protocol (VCP). 443-444 - GaoJun Fan, Shiyao Jin, Wei Cheng:
An approach to finding weak regions for wireless sensor networks with arbitrary sensing areas. 445-446 - Jian (Andrew) Zhang:
BEND: MAC-layer proactive mixing protocol for network coding in multi-hop wireless networks. 447-448 - Chia-Mu Yu, Ting-Yun Chi, Chun-Shien Lu, Sy-Yen Kuo:
A constrained random perturbation vector-based pairwise key establishment scheme for wireless sensor networks. 449-450 - Yong Lee, Goo Yeon Lee:
Authentication for WiFi - WiBbro-based BWAN interworking. 451-452 - Cong Liu, Jie Wu:
Poster abstract: force-based geometric routing. 453-454 - Che-Liang Chiou, Ling-Jyh Chen:
Poster abstract: an evaluation study of routing reliability in opportunistic networks. 455-456 - Sabrina Gaito, Giuliano Grossi, Federico Pedersini:
A two-level social mobility model for trace generation. 457-458 - Ling-Jyh Chen, Ting-Kai Huang, Che-Liang Chiou:
Poster abstract: scalable and collaborative internet access for opportunistic people networks. 459-460 - Shih-Lung Chao, Guan-Yu Lin, Hung-Yu Wei:
Mixed altruistic and selfish users in wireless mesh networks: a game theoretic model for multihop bandwidth sharing. 461-462
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.