The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper addresses the problem of reliable transmission of sensed data through a vast field of small and vulnerable sensors towards a sink node. We concentrate in this paper on networks deployed rapidly in harsh environments as needed for instance in disaster-relief scenarios. Hence, emphasis has to be put on the minimization of the global energy consumption of the network and on providing both...
During the last decade, many works were devoted to improving the performance of relaying techniques in ad hoc networks. One promising approach consists in allowing the relay nodes to cooperate, thus using spatial diversity to increase the capacity of the system. However, this approach introduces an overhead in terms of information exchange, increasing the complexity of the receivers. A simpler way...
During the last decade, many works were devoted to improving the performance of relaying techniques in ad hoc networks. One promising approach consists in allowing the relay nodes to cooperate, thus using spatial diversity to increase the capacity of the system. However, this approach introduces an overhead in terms of information exchange, increasing the complexity of the receivers. A simpler way...
In this paper, we propose a game theoretic framework for distributed intrusion detection in ad hoc networks. The proposed models capture the energy-security tradeoffs for individual monitoring and propose an energy efficient design for distributed monitoring, with probabilistic guarantees for the achieved security level in the network.
This paper addresses the problem of robust transmission of sensed data through a vast field of small and vulnerable sensors towards a sink node. It introduces a routing algorithm called P-GRAB relying on a probabilistic gradient broadcasting framework. Our aim is to improve the GRAB algorithm by accounting for the energy expenditure and the potential of a node for creating interference in the forwarding...
This paper describes an automatic wireless LAN access points planning approach based on a multicriteria modelling and solving. A realistic and efficient wLAN planning approach can not only assess usual objectives based on radio coverage. It has to further implement a Quality of Service (QoS) constraint. In this work, a QoS criterion is defined as the mean available bandwidth per user, derived from...
This paper proposes an automatic base station planning approach. This approach does not only try to assess usual objectives such as radio coverage, but further implements a quality of service (QoS) constraint. This criterion is here defined as the mean available bandwidth per user. Its computation takes the medium access control (MAC) layer behavior, the multiple bit rates of IEEE 802.11b and the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.