Sciweavers

612 search results - page 55 / 123
» Engineering Incentive Schemes for Ad Hoc Networks
Sort
View
141
Voted
INFOCOM
2010
IEEE
15 years 2 months ago
A Self-Organized Mechanism for Thwarting Malicious Access in Ad Hoc Networks
—This paper introduces a self-organized mechanism to control user access in ad hoc networks without requiring any infrastructure or a central administration entity. The proposed ...
Natalia Castro Fernandes, Marcelo D. D. Moreira, O...
182
Voted
MATA
2005
Springer
192views Communications» more  MATA 2005»
15 years 9 months ago
A Cross-Layer Approach for Publish/Subscribe in Mobile Ad Hoc Networks
Abstract. In the context of ubiquitous and pervasive computing, publish/subscribe middleware is gaining momentum due to its loosely coupled communication scheme. In this paper we p...
Marco Avvenuti, Alessio Vecchio, Giovanni Turi
167
Voted
ICPPW
1999
IEEE
15 years 8 months ago
An On-Demand Shared Tree with Hybrid State for Multicast Routing in Ad Hoc Mobile Wireless Networks
This paper describes the Multicast Shared Tree Protocol MSTP that has been designed to support the delivery of multicast packets in a mobile ad hoc network. MSTP uses a shared tre...
Elena Pagani, Gian Paolo Rossi
168
Voted
MOBIQUITOUS
2007
IEEE
15 years 10 months ago
Privacy-Preserving Detection of Sybil Attacks in Vehicular Ad Hoc Networks
— Vehicular ad hoc networks (VANETs) are being advocated for traffic control, accident avoidance, and a variety of other applications. Security is an important concern in VANETs...
Tong Zhou, Romit Roy Choudhury, Peng Ning, Krishne...
145
Voted
ATVA
2005
Springer
156views Hardware» more  ATVA 2005»
15 years 9 months ago
An EFSM-Based Intrusion Detection System for Ad Hoc Networks
Mobile ad hoc networks offer very interesting perspectives in wireless communications due to their easy deployment and their growing performances. However, due to their inherent c...
Jean-Marie Orset, Baptiste Alcalde, Ana R. Cavalli