Sciweavers

211 search results - page 13 / 43
» Identity-Based Access Control for Ad Hoc Groups
Sort
View
INFOCOM
2006
IEEE
14 years 1 months ago
A Packing Approach to Compare Slotted and Non-Slotted Medium Access Control
— In multi-hop ad hoc networks, the efficiency of a medium access control protocol under heavy traffic load depends mainly on its ability to schedule a large number of simultan...
Mathilde Durvy, Patrick Thiran
TC
2010
13 years 6 months ago
Stateless Multicasting in Mobile Ad Hoc Networks
—There are increasing interest and big challenge in designing a scalable and robust multicast routing protocol in a mobile ad hoc network (MANET) due to the difficulty in group ...
Xiaojing Xiang, Xin Wang, Yuanyuan Yang
WOWMOM
2005
ACM
131views Multimedia» more  WOWMOM 2005»
14 years 1 months ago
Ad-Hoc Extensions to the 802.15.3 MAC Protocol
The paper describes the design and evaluation of AdHoc extensions to the IEEE 802.15.3 Medium Access Control (MAC) layer for Wireless Personal Area Networks (WPANs). The proposed ...
Samir Datta, Ivan Seskar, Mustafa Demirhan, Siun-C...
IPPS
2008
IEEE
14 years 2 months ago
A game theoretical data replication technique for mobile ad hoc networks
Adaptive replication of data items on servers of a mobile ad hoc network can alleviate access delays. The selection of data items and servers requires solving a constrained optimi...
Samee Ullah Khan, Anthony A. Maciejewski, Howard J...
WISEC
2009
ACM
14 years 2 months ago
Mitigating control-channel jamming attacks in multi-channel ad hoc networks
We address the problem of control-channel jamming attacks in multi-channel ad hoc networks. Deviating from the traditional view that sees jamming attacks as a physical-layer vulne...
Loukas Lazos, Sisi Liu, Marwan Krunz