Sciweavers

1990 search results - page 350 / 398
» Anonymous communications in mobile ad hoc networks
Sort
View
ICPPW
2006
IEEE
14 years 1 months ago
m-LPN: An Approach Towards a Dependable Trust Model for Pervasive Computing Applications
Trust, the fundamental basis of ‘cooperation’ – one of the most important characteristics for the performance of pervasive ad hoc network-- is under serious threat with the ...
Munirul M. Haque, Sheikh Iqbal Ahamed
GLOBECOM
2007
IEEE
13 years 9 months ago
Hardware-Constrained Multi-Channel Cognitive MAC
—Open spectrum systems allow unlicensed secondary users equipped with cognitive radio to opportunistically access the spectrum underutilized by primary users. Cognitive radio has...
Juncheng Jia, Qian Zhang
SIGCOMM
2012
ACM
11 years 10 months ago
Measuring and fingerprinting click-spam in ad networks
Advertising plays a vital role in supporting free websites and smartphone apps. Click-spam, i.e., fraudulent or invalid clicks on online ads where the user has no actual interest ...
Vacha Dave, Saikat Guha, Yin Zhang
INFOCOM
2002
IEEE
14 years 20 days ago
Energy-Limited Wireless Networking with Directional Antennas: The Case of Session-Based Multicasting
— We consider ad hoc wireless networks that use directional antennas and have limited energy resources. The performance objectives of such networks depend largely on the applicat...
Jeffrey E. Wieselthier, Gam D. Nguyen, Anthony Eph...
CORR
2008
Springer
103views Education» more  CORR 2008»
13 years 7 months ago
Path Loss Exponent Estimation in Large Wireless Networks
In wireless channels, the path loss exponent (PLE) has a strong impact on the quality of the links, and hence, it needs to be accurately estimated for the efficient design and oper...
Sunil Srinivasa, Martin Haenggi