Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleMarch 2006
On the channel modelling and transmission power control for wireless sensor networks
ACMSE '06: Proceedings of the 44th annual ACM Southeast ConferencePages 792–793https://doi.org/10.1145/1185448.1185639In battery powered wireless sensor networks, energy efficiency is one of the most important considerations. Based on field experiments on some typical wireless sensor network, we proposed to explicitly use radio models in transmission power control. We ...
- ArticleMarch 2006
Energy efficient topology control in wireless sensor networks
ACMSE '06: Proceedings of the 44th annual ACM Southeast ConferencePages 784–785https://doi.org/10.1145/1185448.1185635Due to the limited resources available to the nodes (hosts) in the ad hoc wireless networks, the network lifetime is crucial for network operations. One effective approach is to keep the distance small enough among nodes to maintain the efficient network ...
- ArticleMarch 2006
Performance analysis of network protocol offload in a simulation environment
ACMSE '06: Proceedings of the 44th annual ACM Southeast ConferencePages 762–763https://doi.org/10.1145/1185448.1185624Increasing network traffic becomes a burden on the server CPUs, which need to process more packets and still have room for application software. In this paper, we report performance simulation and analysis for servers equipped with TCP/UDP/IP offload ...
- ArticleMarch 2006
Mobility models for vehicular ad hoc network simulations
ACMSE '06: Proceedings of the 44th annual ACM Southeast ConferencePages 746–747https://doi.org/10.1145/1185448.1185615Considerable amount of research has been going on in the area of Vehicular Ad-Hoc networks (VANETS), where vehicles moving along streets in an urban city establish a network among themselves. There has been an increasing commercial and research interest ...
- ArticleMarch 2006
Aligning learning objectives with service-learning outcomes in a mobile computing application
ACMSE '06: Proceedings of the 44th annual ACM Southeast ConferencePages 590–595https://doi.org/10.1145/1185448.1185577We propose the development of a mobile, location-aware tour of the Bonsai Exhibition Garden of the North Carolina Arboretum. The tour will be a web-based, customizable, multimedia presentation on handheld Personal Digital Assistants. The complete tour, ...
- ArticleMarch 2006
Performance comparison of BQM and normal queue management techniques
ACMSE '06: Proceedings of the 44th annual ACM Southeast ConferencePages 350–354https://doi.org/10.1145/1185448.1185526Congestion is an important issue which researchers focus on in the Transmission Control Protocol (TCP)network environment. To keep the stability of the whole network, congestion control algorithms have been extensively studied. Queue management method ...
- ArticleMarch 2006
Efficient route establishment and maintenance in wireless sensor networks with mobile base stations
ACMSE '06: Proceedings of the 44th annual ACM Southeast ConferencePages 343–349https://doi.org/10.1145/1185448.1185525The integration of ground wireless adhoc networks and airborne UAVs is a promising solution for realtime data collection in wireless sensor networks. Such networks play a vital role in many mission critical tasks such as forest fire-fighting and ...
- ArticleMarch 2006
Assessing denial of service vulnerabilities in DOCSIS
ACMSE '06: Proceedings of the 44th annual ACM Southeast ConferencePages 337–342https://doi.org/10.1145/1185448.1185524In previous work a DOCSIS model was added to 'ns' to allow simulations to be run to analyze the performance of DOCSIS. These simulations showed that congestion caused by the asymmetric data paths and the MAC contention process caused several performance ...
- ArticleMarch 2006
Broadcast Updates with Local Look-up Search (BULLS): a new peer-to-peer protocol
ACMSE '06: Proceedings of the 44th annual ACM Southeast ConferencePages 124–129https://doi.org/10.1145/1185448.1185477Peer-to-Peer (P2P) networks based on Gnutella locate files by flooding the network with query messages (a flooding query search). In this paper, a new P2P search paradigm is presented. The network is flooded with the list of shared files and ...
- ArticleMarch 2006
LARS: a locally aware reputation system for mobile ad hoc networks
ACMSE '06: Proceedings of the 44th annual ACM Southeast ConferencePages 119–123https://doi.org/10.1145/1185448.1185475Mobile ad hoc networks (MANETs) have nodes that are dynamically and arbitrarily located. The nodes are often battery powered and may behave selfishly to preserve power. A promising mechanism to deal with node selfishness is to use reputation methods. In ...
- ArticleMarch 2006
Security issues in privacy and key management protocols of IEEE 802.16
ACMSE '06: Proceedings of the 44th annual ACM Southeast ConferencePages 113–118https://doi.org/10.1145/1185448.1185474Without physical boundaries, a wireless network faces many more security threats than a wired network does. Therefore, in the IEEE 802.16 standard a security sublayer is specified in the MAC layer to address the privacy issues across the fixed Broadband ...
- ArticleMarch 2006
Density-based multipath secure communication over mobile ad hoc networks
ACMSE '06: Proceedings of the 44th annual ACM Southeast ConferencePages 107–112https://doi.org/10.1145/1185448.1185473Security is a critical issue in mobile ad hoc networks (MANETs), where mobile nodes communicate with each other over relatively unreliable wireless links with no fixed infrastructure. One example of this occurs on battle fields, where soldiers often wear ...
- ArticleMarch 2006
Determining a sequence of stable multicast Steiner trees in mobile ad hoc networks
ACMSE '06: Proceedings of the 44th annual ACM Southeast ConferencePages 102–106https://doi.org/10.1145/1185448.1185472We show that given the complete knowledge of future topology changes, it is possible to determine the sequence of stable multicast Steiner trees (called the stable mobile multicast Steiner tree) in a multicast session such that the number of tree ...