Sciweavers

515 search results - page 77 / 103
» Distributed Mobility Transparent Broadcast in Mobile Ad Hoc ...
Sort
View
COLCOM
2008
IEEE
14 years 2 months ago
Security through Collaboration in MANETs
It is well understood that Mobile Ad Hoc Networks (MANETs) are extremely susceptible to a variety of attacks, and traditional security mechanisms do not work well. Many security sc...
Wenjia Li, James Parker, Anupam Joshi
ICC
2000
IEEE
241views Communications» more  ICC 2000»
14 years 12 days ago
Power Management for Throughput Enhancement in Wireless Ad-Hoc Networks
—In this paper we introduce the notion of power management within the context of wireless ad-hoc networks. More specifically, we investigate the effects of using different trans...
Tamer A. ElBatt, Srikanth V. Krishnamurthy, Dennis...
ICDCS
2007
IEEE
13 years 12 months ago
Efficient Backbone Construction Methods in MANETs Using Directional Antennas
In this paper, we consider the issue of constructing an energy-efficient virtual network backbone in mobile ad hoc networks (MANETs) for broadcasting applications using directiona...
Shuhui Yang, Jie Wu, Fei Dai
DIALM
2010
ACM
194views Algorithms» more  DIALM 2010»
13 years 6 months ago
Prioritized gossip in vehicular networks
We present a method for using real world mobility traces to identify tractable theoretical models for the study of distributed algorithms in mobile networks. We validate the metho...
Alejandro Cornejo, Calvin C. Newport
ICISC
2004
127views Cryptology» more  ICISC 2004»
13 years 9 months ago
Identity-Based Access Control for Ad Hoc Groups
Abstract. The proliferation of group-centric computing and communication motivates the need for mechanisms to provide group access control. Group access control includes mechanisms...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi