Sciweavers

3370 search results - page 130 / 674
» Adding Networks
Sort
View
VTC
2006
IEEE
179views Communications» more  VTC 2006»
14 years 4 months ago
Design of a Joint Defense System for Mobile Ad Hoc Networks
— A mobile ad hoc network (MANET) is vulnerable to malicious attacks although it is suitable for various environments because of its rapid establishment. In order to set up a sec...
Huei-Wen Ferng, Chien-Liang Liu
WOWMOM
2006
ACM
135views Multimedia» more  WOWMOM 2006»
14 years 3 months ago
A MAC Layer Protocol for Priority-based Reliable Multicast in Wireless Ad Hoc Networks
RTS-CTS handshake based protocols achieve “reliable unicast” by eliminating the hidden node problem effectively, however, these solutions are not directly or efficiently gene...
Murat Demirbas, Muzammil Hussain
ICDCIT
2005
Springer
14 years 3 months ago
Merging Clustering Algorithms in Mobile Ad Hoc Networks
Abstract. Clustering is a widely used approach to ease implementation of various problems such as routing and resource management in mobile ad hoc networks (MANET)s. We propose a n...
Orhan Dagdeviren, Kayhan Erciyes, Deniz Cokuslu
WAC
2005
Springer
135views Communications» more  WAC 2005»
14 years 3 months ago
Context-Driven Self-configuration of Mobile Ad Hoc Networks
We present the design and implementation of a working prototype system that enables self-configuration in mobile ad hoc networks (MANETs) by exploiting context awareness and cross-...
Apostolos Malatras, George Pavlou
ATVA
2005
Springer
156views Hardware» more  ATVA 2005»
14 years 3 months ago
An EFSM-Based Intrusion Detection System for Ad Hoc Networks
Mobile ad hoc networks offer very interesting perspectives in wireless communications due to their easy deployment and their growing performances. However, due to their inherent c...
Jean-Marie Orset, Baptiste Alcalde, Ana R. Cavalli