Sciweavers

977 search results - page 33 / 196
» Detailed OFDM Modeling in Network Simulation of Mobile Ad Ho...
Sort
View
ICDE
2010
IEEE
185views Database» more  ICDE 2010»
14 years 3 months ago
A tuple space for social networking on mobile phones
Abstract— Social networking is increasingly becoming a popular means of communication for online users. The trend is also true for offline scenarios where people use their mobil...
Emre Sarigöl, Oriana Riva, Gustavo Alonso
FGCN
2007
IEEE
173views Communications» more  FGCN 2007»
13 years 10 months ago
Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation
A black hole attack is a severe attack that can be easily employed against routing in mobile ad hoc networks. A black hole is a malicious node that falsely replies for any route r...
Hesiri Weerasinghe, Huirong Fu
ICC
2007
IEEE
178views Communications» more  ICC 2007»
14 years 3 months ago
Impact of Transmission Power on the Performance of UDP in Vehicular Ad Hoc Networks
—With the availability of cheap and robust wireless devices there is demand for new applications in Vehicular Ad-hoc Networks (VANET). The challenge in implementing applications ...
Behrooz Khorashadi, Andrew Chen, Dipak Ghosal, Che...
PERCOM
2006
ACM
14 years 2 months ago
DHT-based Unicast for Mobile Ad Hoc Networks
As mobile ad hoc networks (MANETs) become ever more popular, it also becomes more and more interesting to build distributed network applications (e.g. data storage, etc.) that hav...
Thomas Zahn, Jochen H. Schiller
ICWN
2009
13 years 6 months ago
Threshold Secret Sharing Authentication Scheme in Noisy Mobile Ad Hoc Networks
- This paper presents a description and performance evaluation of a threshold secret sharing (TSS) authentication scheme for selfsecuring mobile ad hoc networks (MANETs) suffering ...
Shakir Hussain, Hussein Al-Bahadili, Ghassan Issa,...