Sciweavers

2634 search results - page 188 / 527
» Infrastructured Ad Hoc Networks
Sort
View
TWC
2010
14 years 11 months ago
Sharp thresholds for relative neighborhood graphs in wireless Ad Hoc networks
In wireless ad hoc networks, relative neighborhood graphs (RNGs) are widely used for topology control. If every node has the same transmission radius, then an RNG can be locally co...
Chih-Wei Yi, Peng-Jun Wan, Lixin Wang, Chao-Min Su
ICASSP
2011
IEEE
14 years 8 months ago
Impulsive interference mitigation in ad hoc networks based on alpha-stable modeling and particle filtering
In this paper, we tackle the problem of interference mitigation in ad hoc networks. In such context, the multiple access interference (MAI) is known to be of an impulsive nature. ...
Nouha Jaoua, Emmanuel Duflos, Philippe Vanheeghe, ...
MOBIQUITOUS
2007
IEEE
15 years 10 months ago
Privacy-Preserving Detection of Sybil Attacks in Vehicular Ad Hoc Networks
— Vehicular ad hoc networks (VANETs) are being advocated for traffic control, accident avoidance, and a variety of other applications. Security is an important concern in VANETs...
Tong Zhou, Romit Roy Choudhury, Peng Ning, Krishne...
WOWMOM
2006
ACM
135views Multimedia» more  WOWMOM 2006»
15 years 10 months ago
A MAC Layer Protocol for Priority-based Reliable Multicast in Wireless Ad Hoc Networks
RTS-CTS handshake based protocols achieve “reliable unicast” by eliminating the hidden node problem effectively, however, these solutions are not directly or efficiently gene...
Murat Demirbas, Muzammil Hussain
WAC
2005
Springer
135views Communications» more  WAC 2005»
15 years 10 months ago
Context-Driven Self-configuration of Mobile Ad Hoc Networks
We present the design and implementation of a working prototype system that enables self-configuration in mobile ad hoc networks (MANETs) by exploiting context awareness and cross-...
Apostolos Malatras, George Pavlou