Sciweavers

1536 search results - page 64 / 308
» Flexible simulation of distributed protocols for mobile comp...
Sort
View
149
Voted
MOBIHOC
2005
ACM
16 years 3 months ago
A secure ad-hoc routing approach using localized self-healing communities
Mobile ad hoc networks (MANETs) are vulnerable to routing attacks, especially attacks launched by non-cooperative (selfish or compromised) network members and appear to be protoco...
Jiejun Kong, Xiaoyan Hong, Yunjung Yi, Joon-Sang P...
111
Voted
CROSSROADS
2004
108views more  CROSSROADS 2004»
15 years 3 months ago
A distributed security scheme for ad hoc networks
In Mobile Ad hoc Networks (MANET), various types of Denial of Service Attacks (DoS) are possible because of the inherent limitations of its routing protocols. Considering the Ad h...
Dhaval Gada, Rajat Gogri, Punit Rathod, Zalak Dedh...
114
Voted
PERCOM
2006
ACM
15 years 9 months ago
DHT-based Unicast for Mobile Ad Hoc Networks
As mobile ad hoc networks (MANETs) become ever more popular, it also becomes more and more interesting to build distributed network applications (e.g. data storage, etc.) that hav...
Thomas Zahn, Jochen H. Schiller
IPPS
2002
IEEE
15 years 8 months ago
A Framework for Network Management Using Mobile Agents
Conventional network management is based on SNMP and often run in a centralized manner. Although the centralized management approach gives network administrators a flexibility of ...
Manoj Kumar Kona, Cheng-Zhong Xu
JUCS
2008
138views more  JUCS 2008»
15 years 3 months ago
A Knowledge Discovery Agent for a Topology Bit-map in Ad Hoc Mobile Networks
: A central characteristic of ad hoc mobile networks is the frequent changes of their topology. This is the source of many problems that need to be solved. AODV is an on-demand rou...
SungSoo Lee, HangKon Kim, ChongGun Kim