Sciweavers

487 search results - page 76 / 98
» A Weight Based Distributed Clustering Algorithm for Mobile a...
Sort
View
ACNS
2011
Springer
241views Cryptology» more  ACNS 2011»
12 years 11 months ago
Misuse Detection in Consent-Based Networks
Consent-based networking, which requires senders to have permission to send traffic, can protect against multiple attacks on the network. Highly dynamic networks like Mobile Ad-hoc...
Mansoor Alicherry, Angelos D. Keromytis
IDC
2009
Springer
13 years 5 months ago
Efficient Broadcasting by Selective Forwarding
A major challenge faced in mobile ad hoc networks (MANETs) is locating devices for communication, especially in the case of high node mobility and sparse node density. Present solu...
Doina Bein, Ajoy Kumar Datta, Balaji Ashok Sathyan...
IWCMC
2006
ACM
14 years 1 months ago
System approach to intrusion detection using hidden Markov model
In an era of cooperating ad hoc networks and pervasive wireless connectivity, we are becoming more vulnerable to malicious attacks. Many of these attacks are silent in nature and ...
Rahul Khanna, Huaping Liu
MSN
2007
Springer
162views Sensor Networks» more  MSN 2007»
14 years 2 months ago
Adaptive Topology Based Gossiping in VANETs Using Position Information
Abstract. Gossiping is a lightweight and simple technique for information dissemination in many application domains, be it in Wireless Sensor Networks (WSNs), Mobile Ad-hoc Network...
Boto Bako, Igor Rikanovic, Frank Kargl, Elmar Scho...
MHCI
2005
Springer
14 years 1 months ago
Searching common experience: a social communication tool based on mobile ad-hoc networking
As small digital cameras become more popular, opportunities to take photos are rapidly increasing. Photo sharing is a great way to maintain and revitalize relationships between fa...
Michimune Kohno, Jun Rekimoto