Sciweavers

270 search results - page 22 / 54
» Distribution of Mobile Agents in Vulnerable Networks
Sort
View
PAKDD
2007
ACM
238views Data Mining» more  PAKDD 2007»
14 years 2 months ago
A Distributed and Cooperative Black Hole Node Detection and Elimination Mechanism for Ad Hoc Networks
A mobile node in ad hoc networks may move arbitrarily and acts as a router and a host simultaneously. Such a characteristic makes nodes in MANET vulnerable to potential attacks. Th...
Chang-Wu Yu, Tung-Kuang Wu, Rei-Heng Cheng, Shun C...
INFORMATICALT
2006
116views more  INFORMATICALT 2006»
13 years 8 months ago
An Agent-Based Best Effort Routing Technique for Load Balancing
Abstract. Several best effort schemes (next-hop routing) are used to transport the data in the Internet. Some of them do not perform flexible route computations to cope up with the...
Sunilkumar S. Manvi, Pallapa Venkataram
ICPADS
2002
IEEE
14 years 1 months ago
Performance Evaluation of Distributed Computing Paradigms in Mobile Ad Hoc Sensor Networks
The emergence of mobile ad hoc sensor networks has brought new challenges to traditional network design. This paper focuses on the study at the application layer. In specific, it...
Yingyue Xu, Hairong Qi
TROB
2008
164views more  TROB 2008»
13 years 8 months ago
Dynamic Assignment in Distributed Motion Planning With Local Coordination
Distributed motion planning of multiple agents raises fundamental and novel problems in control theory and robotics. In particular, in applications such as coverage by mobile senso...
Michael M. Zavlanos, George J. Pappas
ICDCS
2011
IEEE
12 years 8 months ago
JR-SND: Jamming-Resilient Secure Neighbor Discovery in Mobile Ad Hoc Networks
Abstract—Secure neighbor discovery is fundamental to mobile ad hoc networks (MANETs) deployed in hostile environments and refers to the process in which two neighboring nodes exc...
Rui Zhang 0007, Yanchao Zhang, Xiaoxia Huang