Sciweavers

1524 search results - page 43 / 305
» Adapting BitTorrent to Wireless Ad Hoc Networks
Sort
View
PDPTA
2004
13 years 10 months ago
A New Adaptive Distributed Routing Protocol Using d-hop Dominating Sets for Mobile Ad Hoc Networks
In this paper, we propose an adaptive self- stabilizing algorithm for producing a d-hop connected d-hop dominating set. In the algorithm, the set is cumulatively built with commun...
Zhengnan Shi, Pradip K. Srimani
INFOCOM
2003
IEEE
14 years 2 months ago
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks
Abstract— As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad ho...
Yih-Chun Hu, Adrian Perrig, David B. Johnson
PEWASUN
2004
ACM
14 years 2 months ago
A novel solution for achieving anonymity in wireless ad hoc networks
A mobile ad hoc network consists of mobile nodes that can move freely in an open environment. Communicating nodes in a wireless and mobile ad hoc network usually seek the help of ...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
TON
2010
118views more  TON 2010»
13 years 3 months ago
Multicast Capacity of Wireless Ad Hoc Networks Under Gaussian Channel Model
We study the multicast capacity of large-scale random extended multihop wireless networks, where a number of wireless nodes are randomly located in a square region with side length...
Xiang-Yang Li, Yunhao Liu, Shi Li, ShaoJie Tang
NOTERE
2010
13 years 7 months ago
Managing group membership in ad hoc m-commerce trading systems
Abstract—Managing group membership in an ad hoc mcommerce trading forum is a challenging task as peers may only have partial knowledge of the current membership due to frequent n...
Husna Osman, Hamish Taylor