Sciweavers

1970 search results - page 375 / 394
» Node Localisation in Wireless Ad Hoc Networks
Sort
View
DEXAW
2007
IEEE
199views Database» more  DEXAW 2007»
14 years 12 days ago
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulat...
Esther Palomar, Juan M. Estévez-Tapiador, J...
TDSC
2011
13 years 3 months ago
Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET
—In this paper, we study leader election in the presence of selfish nodes for intrusion detection in mobile ad hoc networks (MANETs). To balance the resource consumption among a...
Noman Mohammed, Hadi Otrok, Lingyu Wang, Mourad De...
CONEXT
2006
ACM
14 years 2 months ago
Proposition of a cross-layer architecture model for the support of QoS in ad-hoc networks
Due to the lack of built-in quality of service support, IEEE 802.11 ad-hoc networks presents serious defies in meeting the demands of multimedia applications. To overcome such ch...
Wafa Berrayana, Habib Youssef, Stéphane Loh...
JUCS
2006
143views more  JUCS 2006»
13 years 8 months ago
Context-Aware QoS Provision for Mobile Ad-hoc Network -based Ambient Intelligent Environments
: Lately, wireless networks have gained acceptance for home networking. Low cost installation, flexibility and no fixed infrastructures have made it possible home environments rapi...
Felix Jesús Villanueva, David Villa, Franci...
EUC
2005
Springer
14 years 2 months ago
An Integrated Scheme for Address Assignment and Service Location in Pervasive Environments
We propose an efficient scheme called CoReS (Configuration and Registration Scheme) that integrates address assignment and service location for ad hoc networks prevalent in pervasi...
Mijeom Kim, Mohan Kumar, Behrooz Shirazi