Sciweavers

442 search results - page 23 / 89
» Modeling Trust in Wireless Ad-Hoc Networks
Sort
View
CORR
2010
Springer
77views Education» more  CORR 2010»
13 years 9 months ago
Stochastic Analysis of Non-slotted Aloha in Wireless Ad-Hoc Networks
: In this paper we propose two analytically tractable stochastic models of non-slotted Aloha for Mobile Ad-hoc NETworks (MANETs): one model assumes a static pattern of nodes while ...
Bartek Blaszczyszyn, Paul Mühlethaler
TPDS
2010
199views more  TPDS 2010»
13 years 7 months ago
Flexible Cache Consistency Maintenance over Wireless Ad Hoc Networks
—One of the major applications of wireless ad hoc networks is to extend the Internet coverage and support pervasive and efficient data dissemination and sharing. To reduce data a...
Yu Huang 0002, Jiannong Cao, Beihong Jin, XianPing...
CORR
2007
Springer
126views Education» more  CORR 2007»
13 years 8 months ago
Rethinking Information Theory for Mobile Ad Hoc Networks
The subject of this article is the long standing open problem of developing a general capacity theory for wireless networks, particularly a theory capable of describing the fundam...
Jeffrey G. Andrews, Nihar Jindal, Martin Haenggi, ...
ICNP
2005
IEEE
14 years 2 months ago
The Fundamental Role of Hop Distance in IEEE802.11 Multi-Hop Ad Hoc Networks
In wireless networks, it is well understood what throughput can be achieved by nodes who can hear each other (i.e. nodes within a single cell)[1, 3]. The effects of nodes beyond t...
Yan Gao, Dah-Ming Chiu, John C. S. Lui
ICC
2009
IEEE
153views Communications» more  ICC 2009»
14 years 3 months ago
Detecting Malicious Packet Dropping in the Presence of Collisions and Channel Errors in Wireless Ad Hoc Networks
—Detecting malicious packet dropping is important in ad hoc networks to combat a variety of security attacks such as blackhole, greyhole, and wormhole attacks. We consider the de...
Thaier Hayajneh, Prashant Krishnamurthy, David Tip...