Sciweavers

2684 search results - page 96 / 537
» On the Connectivity of Ad Hoc Networks
Sort
View
CN
2004
163views more  CN 2004»
13 years 8 months ago
Highly reliable trust establishment scheme in ad hoc networks
Securing ad hoc networks in a fully self-organized way is effective and light-weight, but fails to accomplish trust initialization in many trust deficient scenarios. To overcome t...
Kui Ren, Tieyan Li, Zhiguo Wan, Feng Bao, Robert H...
SASN
2003
ACM
14 years 1 months ago
Secure long term communities in ad hoc networks
Until recently, ad hoc networks were mainly used for military and security-sensitive applications. Nowadays, they could also be used in SOHO (Small Office / Home Office) or home n...
Nicolas Prigent, Christophe Bidan, Jean-Pierre And...
IJLT
2008
184views more  IJLT 2008»
13 years 8 months ago
Ad hoc transient communities: towards fostering knowledge sharing in learning networks
: To enhance users' social embedding within learning networks, we propose to establish ad hoc transient communities. These communities serve a particular goal, exist for a lim...
Adriana J. Berlanga, Peter B. Sloep, Liesbeth Kest...
ADHOCNOW
2008
Springer
14 years 2 months ago
Distributed Monitoring in Ad Hoc Networks: Conformance and Security Checking
Ad hoc networks are exposed more than traditional networks to security threats due to their mobility and open architecture aspects. In addition, any dysfunction due to badly congu...
Wissam Mallouli, Bachar Wehbi, Ana R. Cavalli
AINA
2010
IEEE
14 years 1 months ago
Gradient Based Routing Support for Cooperative Multi-channel MAC in Ad Hoc Wireless Networks
— Growing popularity of wireless ad hoc networks leads to higher demands on performance of all TCP/IP stack layers. Usually ad hoc networks operate according to IEEE 802.11 stand...
Stepan Ivanov, Dmitri Botvich, Sasitharan Balasubr...