Sciweavers

1498 search results - page 210 / 300
» A Process Calculus for Mobile Ad Hoc Networks
Sort
View
ADHOCNOW
2006
Springer
14 years 2 months ago
Threats to Security in DSRC/WAVE
Dedicated Short Range Communications (DSRC) enabled road vehicles are on the brink of actualizing an important application of mobile ad hoc networks. It is crucial that the message...
Christine Laurendeau, Michel Barbeau
MWCN
2004
Springer
14 years 1 months ago
The Receiver's Dilemma
In Mobile Ad Hoc Networks (MANETs), each node has the capacity to act as a router. The performance of the MANET relies on how well the nodes perform this function. In simulations,...
John P. Mullen, Timothy Matis, Smriti Rangan
WWIC
2004
Springer
143views Communications» more  WWIC 2004»
14 years 1 months ago
CGGC: Cached Greedy Geocast
Abstract. With cached greedy geocast, we propose an enhanced forwarding scheme for geocast especially in highly mobile ad hoc networks. We will show, that a cache for presently unf...
Christian Maihöfer, Reinhold Eberhardt, Elmar...
WIOPT
2010
IEEE
13 years 6 months ago
On the optimal design of MAC protocols in multi-hop ad hoc networks
Abstract—In this paper, we present our results on the performance of MAC protocols in multi-hop wireless ad hoc networks in terms of the newly proposed metric “aggregate multi-...
Mariam Kaynia, Pedro H. J. Nardell, Paulo Cardieri...
JSAC
2006
111views more  JSAC 2006»
13 years 8 months ago
On trust models and trust evaluation metrics for ad hoc networks
Within the realm of network security, we interpret the concept of trust as a relation among entities that participate in various protocols. Trust relations are based on evidence cr...
George Theodorakopoulos, John S. Baras