Sciweavers

262 search results - page 26 / 53
» Music Retrieval Over Wireless Ad-Hoc Networks
Sort
View
PERCOM
2005
ACM
14 years 8 months ago
Secure Routing and Intrusion Detection in Ad Hoc Networks
Numerous schemes have been proposed for secure routing protocols, and Intrusion Detection and Response Systems, for ad hoc networks. In this paper, we present a proof-of-concept i...
Anand Patwardhan, Jim Parker, Anupam Joshi, Michae...
MOBIQUITOUS
2005
IEEE
14 years 2 months ago
Multi-path Admission Control for Mobile Ad hoc Networks
As wireless networks become more prevalent, users will demand the same applications that are currently available in wired networks. Further, they will expect to receive a quality ...
Anders Lindgren, Elizabeth M. Belding-Royer
ICC
2007
IEEE
201views Communications» more  ICC 2007»
14 years 27 days ago
TMMAC: An Energy Efficient Multi-Channel MAC Protocol for Ad Hoc Networks
This paper presents a TDMA based multi-channel MAC protocol called TMMAC for Ad Hoc Networks. TMMAC requires only a single half-duplex radio transceiver on each node. In addition t...
Jingbin Zhang, Gang Zhou, Chengdu Huang, Sang Hyuk...
ADHOCNOW
2003
Springer
14 years 2 months ago
A Uniform Continuum Model for Scaling of Ad Hoc Networks
This paper models an ad-hoc network as a continuum of nodes, ignoring edge effects, to find how the traffic scales with N, the number of nodes. We obtain expressions for the traffi...
Ernst W. Grundke, A. Nur Zincir-Heywood
ICDCSW
2003
IEEE
14 years 2 months ago
Foundations of Security for Hash Chains in Ad Hoc Networks
Nodes in ad hoc networks generally transmit data at regular intervals over long periods of time. Recently, ad hoc network nodes have been built that run on little power and have v...
Phillip G. Bradford, Olga V. Gavrylyako