Sciweavers

2684 search results - page 126 / 537
» On the Connectivity of Ad Hoc Networks
Sort
View
SASN
2003
ACM
14 years 1 months ago
Modeling vulnerabilities of ad hoc routing protocols
The purpose of this work is to automate the analysis of ad hoc routing protocols in the presence of attackers. To this end, a formal model of protocol behavior is developed in whi...
Shahan Yang, John S. Baras
DKE
2002
263views more  DKE 2002»
13 years 8 months ago
Data management issues in mobile and peer-to-peer environments
Mobile computing is a revolutionary technology, born as a result of remarkable advance in the development of computer hardware and wireless communication. It enables us to access ...
Budiarto, Shojiro Nishio, Masahiko Tsukamoto
JSAC
2006
181views more  JSAC 2006»
13 years 8 months ago
Information theoretic framework of trust modeling and evaluation for ad hoc networks
Abstract-- The performance of ad hoc networks depends on cooperation and trust among distributed nodes. To enhance security in ad hoc networks, it is important to evaluate trustwor...
Yan Lindsay Sun, Wei Yu, Zhu Han, K. J. Ray Liu
IPPS
2007
IEEE
14 years 2 months ago
Evolution of Strategy Driven Behavior in Ad Hoc Networks Using a Genetic Algorithm
In this paper we address the problem of selfish behavior in ad hoc networks. We propose a strategy driven approach which aims at enforcing cooperation between network participant...
Marcin Seredynski, Pascal Bouvry, Mieczyslaw A. Kl...
MWCN
2004
Springer
14 years 1 months ago
Understanding the Interactions between Unicast and Group Communications Sessions in Ad Hoc Networks
Abstract In this paper, our objective is to study and understand the mutual effects between the group communication protocols and unicast sessions in mobile ad hoc networks. The mo...
Lap Kong Law, Srikanth V. Krishnamurthy, Michalis ...