Sciweavers

79 search results - page 12 / 16
» Analyzing a human-based trust model for mobile ad hoc networ...
Sort
View
ADT
2008
13 years 7 months ago
Evaluating voice traffic requirements on IEEE 802.11 ad hoc networks
This paper analyzes voice transmission capacity on IEEE 802.11 ad hoc networks by performing simulations related to delay, jitter, loss rate, and consecutive losses. We evaluate th...
Pedro B. Velloso, Marcelo G. Rubinstein, Otto Carl...
MOBICOM
2000
ACM
13 years 11 months ago
Caching strategies in on-demand routing protocols for wireless ad hoc networks
An on-demand routing protocol for wireless ad hoc networks is one that searches for and attempts to discover a route to some destination node only when a sending node originates a...
Yih-Chun Hu, David B. Johnson
RAID
2004
Springer
14 years 11 days ago
Attack Analysis and Detection for Ad Hoc Routing Protocols
Abstract. Attack analysis is a challenging problem, especially in emerging environments where there are few known attack cases. One such new environment is the Mobile Ad hoc Networ...
Yi-an Huang, Wenke Lee
VTC
2007
IEEE
115views Communications» more  VTC 2007»
14 years 1 months ago
The DYMO Routing Protocol in VANET Scenarios
—Coupling Vehicular Ad Hoc Networks (VANETs) with wired networks such as the Internet via access points creates a difficult mix of highly mobile nodes and a static infrastructur...
Christoph Sommer, Falko Dressler
JUCS
2006
86views more  JUCS 2006»
13 years 7 months ago
Secure Service Discovery based on Trust Management for ad-hoc Networks
Abstract: In ad-hoc networks, mobile devices communicate via wireless links without the aid of any fixed networking infrastructure. These devices must be able to discover services ...
Celeste Campo, Florina Almenárez Mendoza, D...