• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 10,319
Next 10 →

On the Selection of Transmission Range in Underwater Acoustic

by Author(s Gao, Mingsheng Foh, Chuan Heng Cai, Mingsheng Gao, Chuan Heng Foh, Jianfei Cai , 2012
"... transmission range in underwater acoustic sensor ..."
Abstract - Add to MetaCart
transmission range in underwater acoustic sensor

Degradation of Transmission Range

by R. K. Schmidt, T. Köllmer, T. Leinmüller, B. Böddeker, G. Schäfer, In Vanets Caused Interference
"... Reliability is one of the key requirements for inter-vehicle communication in order to improve safety in road traffic. This paper describes the difficulties of inter-vehicle communication. We focus on an analysis of the state-of-the art MAC protocol draft IEEE P802.11p and its limitations in high lo ..."
Abstract - Add to MetaCart
load situations. For our analysis we consider a particular safety scenario: An emergency vehicle is approaching a traffic jam. In a simulation experiment, we highlight that severe packet loss can occur. The reliable transmission range can be reduced by up to 90%. The main reason for this degradation

Determination of Critical Transmission Range in Ad-Hoc Networks

by Miguel Sánchez, Pietro Manzoni, Zygmunt J. Haas - In Proc. of the Multiaccess, Mobility and Teletraffic for Wireless Communications (MMT) Conference , 1999
"... Ad-hoc networks are wireless mobile networks that do not rely on preexisting infrastructure. In such networks, multi-hop routing is used to achieve large degree of network connectivity and each node in the network acts as a router for its neighbors. The range of the radio transceivers is chosen as a ..."
Abstract - Cited by 59 (3 self) - Add to MetaCart
as a trade-off between full network connectivity, the reuse of the available spectrum, and power consumption. This paper presents an algorithm to calculate the minimum transmission range of the transceivers that is required to achieve, with some probability, full network connectivity. Furthermore, we

Ariadne: a secure on-demand routing protocol for ad hoc networks," in

by Yih-Chun Hu , Adrian Perrig , David B Johnson - Proc. 8th ACM International Conf. Mobile Computing Networking , , 2002
"... Abstract An ad hoc network is a group of wireless mobile computers (or nodes), in which individual nodes cooperate by forwarding packets for each other to allow nodes to communicate beyond direct wireless transmission range. Prior research in ad hoc networking has generally studied the routing prob ..."
Abstract - Cited by 925 (12 self) - Add to MetaCart
Abstract An ad hoc network is a group of wireless mobile computers (or nodes), in which individual nodes cooperate by forwarding packets for each other to allow nodes to communicate beyond direct wireless transmission range. Prior research in ad hoc networking has generally studied the routing

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

by Josh Broch, David A. Maltz, David B. Johnson, Yih-chun Hu, Jorjeta Jetcheva , 1998
"... An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration. Due to the limited transmission range of wireless network interfaces, multiple network "hops " ma ..."
Abstract - Cited by 1819 (25 self) - Add to MetaCart
An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration. Due to the limited transmission range of wireless network interfaces, multiple network "hops &

Optimum Transmission Range for Wireless Ad Hoc Networks

by Jing Deng, Yunghsiang S. Han - In IEEE Wireless Communications and Networking Conference , 2004
"... The transmission range that achieves the most economical use of energy in wireless ad hoc networks is studied under homogeneous node distribution. By assuming the knowledge of node location, we first proposed a transmission strategy to ensure the progress of data packets toward their final destinati ..."
Abstract - Cited by 23 (3 self) - Add to MetaCart
The transmission range that achieves the most economical use of energy in wireless ad hoc networks is studied under homogeneous node distribution. By assuming the knowledge of node location, we first proposed a transmission strategy to ensure the progress of data packets toward their final

HEED: A Hybrid, Energy-Efficient, Distributed Clustering Approach for Ad Hoc Sensor Networks

by Ossama Younis, Sonia Fahmy - IEEE TRANS. MOBILE COMPUTING , 2004
"... Topology control in a sensor network balances load on sensor nodes and increases network scalability and lifetime. Clustering sensor nodes is an effective topology control approach. In this paper, we propose a novel distributed clustering approach for long-lived ad hoc sensor networks. Our proposed ..."
Abstract - Cited by 590 (1 self) - Add to MetaCart
bounds on node density and intracluster and intercluster transmission ranges, HEED can asymptotically almost surely guarantee connectivity of clustered networks. Simulation results demonstrate that our proposed approach is effective in prolonging the network lifetime and supporting scalable data

GPS-Less Low Cost Outdoor Localization for Very Small Devices.

by Nirupama Bulusu , John Heidemann , Deborah Estrin - IEEE Personal Communications Magazine, , 2000
"... Abstract-Instrumenting the physical world through large networks of wireless sensor nodes, particularly for applications like environmental monitoring of water and soil, requires that these nodes be very small, light, untethered and unobtrusive. The problem of localization, i.e., determining where ..."
Abstract - Cited by 1000 (27 self) - Add to MetaCart
points. The accuracy of localization is then dependent on the separation distance between two adjacent reference points and the transmission range of these reference points. Initial experimental results show that the accuracy for 90% of our data points is within one-third of the separation distance

A Survey of Mobility Models for Ad Hoc Network Research

by Tracy Camp , Jeff Boleng, Vanessa Davies - WIRELESS COMMUNICATIONS & MOBILE COMPUTING (WCMC): SPECIAL ISSUE ON MOBILE AD HOC NETWORKING: RESEARCH, TRENDS AND APPLICATIONS , 2002
"... In the performance evaluation of a protocol for an ad hoc network, the protocol should be tested under realistic conditions including, but not limited to, a sensible transmission range, limited buffer space for the storage of messages, representative data traffic models, and realistic movements of t ..."
Abstract - Cited by 1213 (8 self) - Add to MetaCart
In the performance evaluation of a protocol for an ad hoc network, the protocol should be tested under realistic conditions including, but not limited to, a sensible transmission range, limited buffer space for the storage of messages, representative data traffic models, and realistic movements

A Study of Critical Transmission Range for Connectivity

by A. A. A. Radwan, Marghny H. Mohamed, Mahmoud A. Mofaddel, Hamdy H. El-sayed - in Ad Hoc Network, Information Sciences Letters , 2013
"... Abstract: In this paper, the critical transmitting range for connectivity in wireless ad hoc networks is analyzed. More specifically, we consider the following problem: Assume n nodes, each capable of communicating with nodes within a radius of r. The nods are randomly and uniformly distributed in a ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
in a d-dimensional region with a side of lengthl. In this paper the critical transmission range in dense and sparse network is studied. The critical transmission range in RWP mobile network and the critical transmission range for k-connectivity are investigated. The results of this paper could
Next 10 →
Results 1 - 10 of 10,319
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University