Sciweavers

1495 search results - page 32 / 299
» A Friend Mechanism for Mobile Ad Hoc Networks
Sort
View
SUTC
2006
IEEE
14 years 4 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
VLDB
2008
ACM
133views Database» more  VLDB 2008»
14 years 10 months ago
A survey of data replication techniques for mobile ad hoc network databases
Prasanna Padmanabhan, Le Gruenwald, Anita Vallur, ...
CSFW
2010
IEEE
14 years 2 months ago
Modeling and Verifying Ad Hoc Routing Protocols
Mobile ad hoc networks consist of mobile wireless devices which autonomously organize their infrastructure. In such a network, a central issue, ensured by routing protocols, is to ...
Mathilde Arnaud, Véronique Cortier, St&eacu...
ANTSW
2008
Springer
14 years 17 days ago
Formal Modeling of BeeAdHoc: A Bio-inspired Mobile Ad Hoc Network Routing Protocol
Design and development of routing protocols for Mobile Ad Hoc Networks (MANETs) is an active area of research. The standard practice among researchers working in this emerging doma...
Muhammad Saleem, Syed Ali Khayam, Muddassar Farooq
ISPAN
1999
IEEE
14 years 2 months ago
Supporting Hierarchy and Heterogeneous Interfaces in Multi-Hop Wireless Ad Hoc Networks
Much progress has been made toward solving the problem of routing packets inside an ad hoc network, but there are presently no complete proposals for connecting ad hoc networks to...
Josh Broch, David A. Maltz, David B. Johnson