Sciweavers

522 search results - page 53 / 105
» Connected k-Hop Clustering in Ad Hoc Networks
Sort
View
ICC
2007
IEEE
144views Communications» more  ICC 2007»
14 years 3 months ago
On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks
— Colluding malicious insider nodes with no special hardware capability can use packet encapsulation and tunnelling to create bogus short-cuts (in-band wormholes) in routing path...
Xu Su, Rajendra V. Boppana
ISCC
2005
IEEE
162views Communications» more  ISCC 2005»
14 years 2 months ago
A JXTA Compliant Framework for Mobile Handheld Devices in Ad Hoc Networks
The availability of powerful personal computers and high bandwidth home connectivity is changing the way users cooperate and exchange information on the network. Peer to peer comp...
Mario Bisignano, Giuseppe Di Modica, Orazio Tomarc...
GLOBECOM
2009
IEEE
14 years 23 days ago
A Mobicast Routing Protocol in Vehicular Ad-Hoc Networks
In this paper, we present a spatiotemporal multicast , called a mobicast, protocol for supporting applications which require spatiotemporal coordination in VANETs. The spatiotempor...
Yuh-Shyan Chen, Yun-Wei Lin, Sing-Ling Lee
INFOCOM
2003
IEEE
14 years 2 months ago
On-demand Power Management for Ad Hoc Networks
— Battery power is an important resource in ad hoc networks. It has been observed that in ad hoc networks, energy consumption does not reflect the communication activities in th...
Rong Zheng, Robin Kravets
AINA
2008
IEEE
13 years 9 months ago
Updated Data Dissemination for Applications with Time Constraints in Mobile Ad Hoc Networks
In our previous work, we proposed few updated data dissemination methods to refresh old replicas efficiently in mobile ad hoc networks. These methods disseminate updated data item...
Takahiro Hara, Sanjay Kumar Madria