Sciweavers

1469 search results - page 57 / 294
» Cooperation in Wireless Ad Hoc Networks
Sort
View
SUTC
2006
IEEE
14 years 3 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
ISCC
2002
IEEE
169views Communications» more  ISCC 2002»
14 years 2 months ago
Congestion controlled adaptive lightweight multicast in wireless mobile ad hoc networks
The use of contention-based MAC protocols combined with hidden terminal problems make multi-hop wireless ad hoc networks much more sensitive to load and congestion than wired netw...
Ken Tang, Katia Obraczka, Sung-Ju Lee, Mario Gerla
WIOPT
2010
IEEE
13 years 7 months ago
A multiobjective performance evaluation framework for routing in wireless ad hoc networks
—Wireless ad hoc networks are seldom characterized by one single performance metric, yet the current literature lacks a flexible framework to assist in characterizing the design...
Katia Jaffrès-Runser, Mary R. Schurgot, Cri...
ICWN
2010
13 years 7 months ago
Detecting and Labelling Wireless Community Network Structures from Eigen-spectra
Wireless and ad hoc networks often have local regions of highly intra-connected modules or communities of nodes against a backdrop of sparser longer-range intercommunity connectiv...
Ken A. Hawick
IJNSEC
2007
145views more  IJNSEC 2007»
13 years 9 months ago
Authenticated Group Key Agreement Protocols for Ad hoc Wireless Networks
The lack of fixed infrastructure, both physical and organizational, and the highly dynamic nature of ad hoc networks, presents a major challenge in providing secure, authenticate...
Ahmed Abdel-Hafez, Ali Miri, Luis Orozco-Barbosa