Sciweavers

1990 search results - page 324 / 398
» Anonymous communications in mobile ad hoc networks
Sort
View
BROADNETS
2007
IEEE
14 years 3 months ago
Assessing discreet packet-dropping attacks using nearest-neighbor and path-vector attribution
— A Mobile Ad-Hoc Network (MANET) is considered with nodes that may act selfishly or maliciously by simply dropping data packets rather than forwarding them. We study a distribu...
Arnab Das 0002, George Kesidis, Venkat Pothamsetty
AAAI
2004
13 years 10 months ago
Intelligent Systems Demonstration: The Secure Wireless Agent Testbed (SWAT)
We will demonstrate the Secure Wireless Agent Testbed (SWAT), a unique facility developed at Drexel University to study integration, networking and information assurance for next-...
Gustave Anderson, Andrew Burnheimer, Vincent A. Ci...
WICON
2008
13 years 10 months ago
An experimental study on connectivity and topology control in real multi-hop wireless networks
Topology control by means of transmit power adjustment is a well-studied technique for improving the network capacity and energy efficiency of wireless ad hoc networks. In this pa...
Alvin C. Valera, Pius W. Q. Lee, Yew Fai Wong, Win...
CN
2002
87views more  CN 2002»
13 years 8 months ago
Resource management in energy-limited, bandwidth-limited, transceiver-limited wireless networks for session-based multicasting
In this paper we consider source-initiated multicast session traffic in an ad hoc wireless network, operating under hard constraints on the available transmission energy as well a...
Jeffrey E. Wieselthier, Gam D. Nguyen, Anthony Eph...
HICSS
2005
IEEE
128views Biometrics» more  HICSS 2005»
14 years 2 months ago
Distributed Sleep-Scheduling Protocols for Energy Conservation in Wireless Networks
This paper presents a distributed sleep scheduling protocol that can be used for implementing synchronous interface sleep for energy conservation in wireless Ad Hoc networks. Cent...
Rohit Naik, Subir K. Biswas, Samir Datta