Sciweavers

675 search results - page 44 / 135
» Ad Hoc Network Authentication: A Jini-Based Approach
Sort
View
ADHOCNOW
2006
Springer
14 years 2 months ago
Circularity-Based Medium Access Control in Mobile Ad Hoc Networks
Abstract. The RTS/CTS access scheme, designed to reduce the number of collisions in a IEEE 802.11 network, is known to exhibit problems due to masked nodes, the imbalance between t...
Mohammad Z. Ahmad, Damla Turgut, R. Bhakthavathsal...
COMPSAC
2003
IEEE
14 years 1 months ago
A Middleware Service for Secure Group Communication in Mobile Ad Hoc Networks
Secure group communication in mobile ad hoc networks is often dynamic and impromptu, and thus requires efficient and automated secure group management and seamless combination of ...
Stephen S. Yau, Xinyu Zhang
MOBIQUITOUS
2007
IEEE
14 years 2 months ago
A Ferry-based Intrusion Detection Scheme for Sparsely Connected Ad Hoc Networks
— Several intrusion detection approaches have been proposed for mobile adhoc networks. Many of the approaches assume that there are sufficient neighbors to help monitor the trans...
Mooi Choo Chuah, Peng Yang, Jianbin Han
MWCN
2004
Springer
14 years 1 months ago
Collaboration Enforcement and Adaptive Data Redirection in Mobile Ad Hoc Networks Using Only First-Hand Experience
: In Mobile Ad Hoc Networks (MANETs), all participating hosts are obligated to route and forward data for others to guarantee the availability of network applications and services....
Ning Jiang, Kien A. Hua, Mounir A. Tantaoui
INFOCOM
2002
IEEE
14 years 1 months ago
Optimal Rate Allocation and Traffic Splits for Energy Efficient Routing in Ad Hoc Networks
Abstract— In this paper, we address the problem of providing traffic quality of service and energy efficiency in ad hoc wireless networks. We consider a network that is shared ...
Vikram Srinivasan, Carla-Fabiana Chiasserini, Pava...