Sciweavers

2684 search results - page 368 / 537
» On the Connectivity of Ad Hoc Networks
Sort
View
JSAC
2006
156views more  JSAC 2006»
13 years 8 months ago
Wormhole attacks in wireless networks
Abstract-- As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc...
Yih-Chun Hu, Adrian Perrig, David B. Johnson
EUROPAR
2008
Springer
13 years 10 months ago
Auction Protocols for Resource Allocations in Ad-Hoc Grids
Abstract. Different auction-based approaches have been used to allocate resources in Grids, but none of them provide the design choice for a specific economic model while consideri...
Behnaz Pourebrahimi, Koen Bertels
ICDCSW
2003
IEEE
14 years 1 months ago
Survivable Multi-Level Ad-Hoc Group Operations
In this paper we investigate the survivability of multilevel ad-hoc groups for critical operations through a case study. We aim to provide a formal trust framework for establishin...
Dan Zhou, Jie Wu
DC
2010
13 years 8 months ago
An optimal maximal independent set algorithm for bounded-independence graphs
We present a novel distributed algorithm for the maximal independent set (MIS) problem.1 On bounded-independence graphs (BIG) our deterministic algorithm finishes in O(log n) time,...
Johannes Schneider, Roger Wattenhofer
ACSC
2007
IEEE
14 years 2 months ago
Hybrid Mesh Ad-Hoc On-Demand Distance Vector Routing Protocol
Wireless Mesh Networks (WMNs) have recently gained increasing attention and have emerged as a technology with great potential for a wide range of applications. WMNs can be conside...
Asad Amir Pirzada, Marius Portmann, Jadwiga Induls...