Sciweavers

303 search results - page 18 / 61
» A Lightweight Scheme for Auto-configuration in Mobile Ad Hoc...
Sort
View
ICDCSW
2007
IEEE
14 years 2 months ago
A Cooperative Approach for Analyzing Intrusions in Mobile Ad hoc Networks
In this paper, we consider the problem of reducing the number of false positives generated by cooperative Intrusion Detection Systems (IDSs) in Mobile Ad hoc Networks (MANETs). We...
Hadi Otrok, Mourad Debbabi, Chadi Assi, Prabir Bha...
INFOCOM
2000
IEEE
14 years 3 days ago
Virtual Backbone Generation and Maintenance in Ad Hoc Network Mobility Management
Abstract—In this paper, we present the implementation issues of a virtual backbone that supports the operations of the Uniform Quorum System (UQS) and the Randomized Database Gro...
Ben Liang, Zygmunt J. Haas
ADHOC
2006
124views more  ADHOC 2006»
13 years 7 months ago
Mobility-capacity-delay trade-off in wireless ad hoc networks
We show that there is a trade-off among mobility, capacity, and delay in ad hoc networks. More specifically, we consider two schemes for node mobility in ad hoc networks. We divid...
Renato M. de Moraes, Hamid R. Sadjadpour, J. J. Ga...
ICIP
2006
IEEE
14 years 9 months ago
Multi Source Streaming for Robust Video Transmission in Mobile Ad-Hoc Networks
Video transmission over networks is getting increasingly important, thus upcoming network types like Mobile Ad-Hoc Networks (MANETs) can also become a suitable platform for exchan...
Cornelius Hellge, Karsten Gänger, Thomas Schi...
CIIT
2007
195views Communications» more  CIIT 2007»
13 years 9 months ago
Using a cache scheme to detect selfish nodes in mobile ad hoc networks
This paper presents a hardware based cache scheme to detect selfish nodes in mobile ad hoc network. In this scheme, the hardware monitors the activities of the upperlayer software...
H. Lin, José G. Delgado-Frias, Sirisha Medi...