Skip to main content

Wireless Network Algorithms, Systems, and Applications

  1. One of the great mysteries of the brain is cognitive control. How can the interactions between millions of neurons result in behavior that is coordinated and appears willful and voluntary? There is consensus t...

    Authors: Qilian Liang
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2010:523435
  2. Information collection in the disaster area is an important application of pigeon networks—a special type of delay tolerant networks (DTNs) that borrows the ancient idea of using pigeons as the telecommunicati...

    Authors: Jiazhen Zhou, Jiang Li and Legand Burge
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2010:142921
  3. The spectrum scarcity problem emerged in recent years, due to unbalanced utilization of RF (radio frequency) bands in the current state of wireless spectrum allocations. Spectrum access scheduling addresses ch...

    Authors: Lichun Bao and Shenghui Liao
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2010:736365
  4. Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding attackers, one of which sniffs packets at one point in the networ...

    Authors: Honglong Chen, Wei Lou, Xice Sun and Zhi Wang
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2010:627039
  5. Increasingly ubiquitous wireless technologies require novel localization techniques to pinpoint the position of an uncooperative node, whether the target is a malicious device engaging in a security exploit or...

    Authors: Christine Laurendeau and Michel Barbeau
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2010:567040
  6. In Mobile Ad Hoc Networks (MANETs), determining the physical location of nodes (localization) is very important for many network services and protocols. This paper proposes a new Distributed Range-Free Localiz...

    Authors: PhamDoan Tinh and Makoto Kawai
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2010:692513
  7. Source privacy plays a key role in communication infrastructure protection. It is a critical security requirement for many mission critical communications. This is especially true for mobile ad hoc networks (M...

    Authors: Jian Ren, Yun Li and Tongtong Li
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2010:534712
  8. We propose a network quality aware routing (NQAR) mechanism to provide an enabling method of the delay-sensitive data delivery over error-prone wireless sensor networks. Unlike the existing routing methods tha...

    Authors: Jaewon Choi, Baek-Young Choi, Sejun Song and Kwang-Hui Lee
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2010:409724
  9. This paper studies the capacity of hybrid wireless networks with opportunistic routing (OR). We first extend the opportunistic routing algorithm to exploit high-speed data transmissions in infrastructure netwo...

    Authors: Tan Le and Yong Liu
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2010:202197
  10. Wireless sensors rely on battery power, and in many applications it is difficult or prohibitive to replace them. Hence, in order to prolongate the system's lifetime, some sensors can be kept inactive while oth...

    Authors: Giordano Fusco and Himanshu Gupta
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2010:192752
  11. We provide primitives for uniquely localizing WSN nodes. The goal is to maximize the number of uniquely localized nodes assuming a fully decentralized model of computation. Each node constructs a cluster of it...

    Authors: Arda Cakiroglu and Cesim Erten
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2010:605658
  12. Routing in wireless networks has been heavily studied in the last decade. Many routing protocols are based on classic shortest path algorithms. However, shortest path-based routing protocols suffer from uneven...

    Authors: Fan Li, Siyuan Chen and Yu Wang
    Citation: EURASIP Journal on Wireless Communications and Networking 2009 2010:623706