Sciweavers

977 search results - page 28 / 196
» Detailed OFDM Modeling in Network Simulation of Mobile Ad Ho...
Sort
View
IJNSEC
2006
205views more  IJNSEC 2006»
13 years 8 months ago
A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks
Nodes in a mobile ad hoc network need to thwart various attacks and malicious activities. This is especially true for the ad hoc environment where there is a total lack of central...
Animesh Patcha, Jung-Min Park
TMC
2008
125views more  TMC 2008»
13 years 8 months ago
Distributed Algorithm for Efficient Construction and Maintenance of Connected k-Hop Dominating Sets in Mobile Ad Hoc Networks
A k-hop dominating set is a subset of nodes such that each node not in the set can be reached within k hops from at least one node in the set. A connected k-hop dominating set can ...
Hong-Yen Yang, Chia-Hung Lin, Ming-Jer Tsai
TIFS
2008
149views more  TIFS 2008»
13 years 8 months ago
Secure Cooperation in Autonomous Mobile Ad-Hoc Networks Under Noise and Imperfect Monitoring: A Game-Theoretic Approach
In autonomous mobile ad-hoc networks, one major challenge is to stimulate cooperation among selfish nodes, especially when some nodes may be malicious. In this paper, we address co...
Wei Yu, K. J. Ray Liu
ENTCS
2007
96views more  ENTCS 2007»
13 years 8 months ago
An Observational Theory for Mobile Ad Hoc Networks
We propose a process calculus to study the behavioural theory of Mobile Ad Hoc Networks. The operational semantics of our calculus is given both in terms of a Reduction Semantics ...
Massimo Merro
HASE
2007
IEEE
14 years 17 days ago
Development of Custom Selling System Using Ad Hoc Networks
Recently, many routing protocols and applications for mobile ad hoc networks have been proposed. However, most of them are tested through the simulation experiments, but are not d...
Masato Asada, Tomoyuki Ohta, Kenji Ishida, Yoshiak...