Sciweavers

703 search results - page 92 / 141
» Advanced and Applications in Vehicular Ad Hoc Networks
Sort
View
MOBICOM
2004
ACM
14 years 1 months ago
Detecting and correcting malicious data in VANETs
In order to meet performance goals, it is widely agreed that vehicular ad hoc networks (VANETs) must rely heavily on node-to-node communication, thus allowing for malicious data t...
Philippe Golle, Daniel H. Greene, Jessica Staddon
ICN
2005
Springer
14 years 1 months ago
Enhancing QoS Through Alternate Path: An End-to-End Framework
In the next generation Internet, the network should not only be considered as a communication medium, but also as an endless source of services available to the end-systems. These ...
Thierry Rakotoarivelo, Patrick Sénac, Aruna...
HICSS
2010
IEEE
222views Biometrics» more  HICSS 2010»
13 years 9 months ago
Application-Layer Intrusion Detection in MANETs
— Security has become important to mobile ad hoc networks (MANETs) due mainly to their use for many missionand life-critical applications. However, the broadcast nature of inter-...
Katharine Chang, Kang G. Shin
SIGCOMM
2009
ACM
14 years 2 months ago
MobiClique: middleware for mobile social networking
We consider a mobile ad hoc network setting where Bluetooth enabled mobile devices communicate directly with other devices as they meet opportunistically. We design and implement ...
Anna Kaisa Pietiläinen, Earl Oliver, Jason Le...
AINA
2008
IEEE
14 years 2 months ago
Towards a Usenet-Like Discussion System for Users of Disconnected MANETs
Applications that rely on the publish-subscribe model (such as those dedicated to news or event distribution) require a communication model whereby information can flow towards a...
Julien Haillot, Frédéric Guidec