Sciweavers

1316 search results - page 177 / 264
» Neuroevolution of mobile ad hoc networks
Sort
View
ICCCN
2008
IEEE
14 years 3 months ago
A Trust Model Robust to Slander Attacks in Ad Hoc Networks
— Slander attacks represent a significant danger to distributed reputation systems. Malicious nodes may collude to lie about the reputation of a particular neighbor and cause se...
Pedro B. Velloso, Rafael P. Laufer, Otto Carlos Mu...
INFOCOM
2008
IEEE
14 years 3 months ago
On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks
—We argue that the traditional notion of trust as a relation among entities, while useful, becomes insufficient for emerging data-centric mobile ad hoc networks. In these system...
Maxim Raya, Panagiotis Papadimitratos, Virgil D. G...
TMC
2008
152views more  TMC 2008»
13 years 9 months ago
CDR-MAC: A Protocol for Full Exploitation of Directional Antennas in Ad Hoc Wireless Networks
In this paper, we propose a new Medium Access Control (MAC) protocol for full exploitation of directional antennas in wireless networks. The protocol introduces a circular directio...
Thanasis Korakis, Gentian Jakllari, Leandros Tassi...
IFIP
2009
Springer
14 years 3 months ago
A Calculus of Trustworthy Ad Hoc Networks
We propose a process calculus for mobile ad hoc networks which embodies a behaviour-based multilevel decentralised trust model. Our trust model supports both direct trust, by monit...
Massimo Merro, Eleonora Sibilio
CD
2005
Springer
14 years 2 months ago
Cooperative Component-Based Software Deployment in Wireless Ad Hoc Networks
Abstract. This paper presents a middleware platform we designed in order to allow the deployment of component-based software applications on mobile devices (such as laptops or pers...
Hervé Roussain, Frédéric Guid...