Skip to content

Advertisement

Wireless Network Algorithms, Systems, and Applications

  1. Content type: Research Article

    One of the great mysteries of the brain is cognitive control. How can the interactions between millions of neurons result in behavior that is coordinated and appears willful and voluntary? There is consensus t...

    Authors: Qilian Liang

    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2010:523435

    Published on:

  2. Content type: Research Article

    Information collection in the disaster area is an important application of pigeon networks—a special type of delay tolerant networks (DTNs) that borrows the ancient idea of using pigeons as the telecommunicati...

    Authors: Jiazhen Zhou, Jiang Li and Legand Burge

    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2010:142921

    Published on:

  3. Content type: Research Article

    The spectrum scarcity problem emerged in recent years, due to unbalanced utilization of RF (radio frequency) bands in the current state of wireless spectrum allocations. Spectrum access scheduling addresses ch...

    Authors: Lichun Bao and Shenghui Liao

    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2010:736365

    Published on:

  4. Content type: Research Article

    Increasingly ubiquitous wireless technologies require novel localization techniques to pinpoint the position of an uncooperative node, whether the target is a malicious device engaging in a security exploit or...

    Authors: Christine Laurendeau and Michel Barbeau

    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2010:567040

    Published on:

  5. Content type: Research Article

    Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sniffs packets at one point in the networ...

    Authors: Honglong Chen, Wei Lou, Xice Sun and Zhi Wang

    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2010:627039

    Published on:

  6. Content type: Research Article

    Source privacy plays a key role in communication infrastructure protection. It is a critical security requirement for many mission critical communications. This is especially true for mobile ad hoc networks (M...

    Authors: Jian Ren, Yun Li and Tongtong Li

    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2010:534712

    Published on:

  7. Content type: Research Article

    This paper studies the capacity of hybrid wireless networks with opportunistic routing (OR). We first extend the opportunistic routing algorithm to exploit high-speed data transmissions in infrastructure netwo...

    Authors: Tan Le and Yong Liu

    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2010:202197

    Published on:

  8. Content type: Research Article

    In Mobile Ad Hoc Networks (MANETs), determining the physical location of nodes (localization) is very important for many network services and protocols. This paper proposes a new Distributed Range-Free Localiz...

    Authors: PhamDoan Tinh and Makoto Kawai

    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2010:692513

    Published on:

  9. Content type: Research Article

    We propose a network quality aware routing (NQAR) mechanism to provide an enabling method of the delay-sensitive data delivery over error-prone wireless sensor networks. Unlike the existing routing methods tha...

    Authors: Jaewon Choi, Baek-Young Choi, Sejun Song and Kwang-Hui Lee

    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2010:409724

    Published on:

  10. Content type: Research Article

    Wireless sensors rely on battery power, and in many applications it is difficult or prohibitive to replace them. Hence, in order to prolongate the system's lifetime, some sensors can be kept inactive while oth...

    Authors: Giordano Fusco and Himanshu Gupta

    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2010:192752

    Published on:

  11. Content type: Research Article

    We provide primitives for uniquely localizing WSN nodes. The goal is to maximize the number of uniquely localized nodes assuming a fully decentralized model of computation. Each node constructs a cluster of it...

    Authors: Arda Cakiroglu and Cesim Erten

    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2010:605658

    Published on:

  12. Content type: Research Article

    Routing in wireless networks has been heavily studied in the last decade. Many routing protocols are based on classic shortest path algorithms. However, shortest path-based routing protocols suffer from uneven...

    Authors: Fan Li, Siyuan Chen and Yu Wang

    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2010:623706

    Published on: