Sciweavers

278 search results - page 15 / 56
» Performance of a Jini-based Ad Hoc Network Authentication Sc...
Sort
View
CIIT
2007
161views Communications» more  CIIT 2007»
13 years 8 months ago
Using a two-timer scheme to detect selfish nodes in mobile ad-hoc networks
The cooperation of wireless nodes in ad hoc networks is crucial to ensure the proper working of the whole network due to the absence of infrastructure. Misbehaving nodes can drama...
H. Lui, José G. Delgado-Frias, Sirisha Medi...
INFOCOM
2011
IEEE
12 years 10 months ago
Content management in a mobile ad hoc network: Beyond opportunistic strategy
Abstract—We study the challenging problem of strategic content placement in a dynamic MANET. Existing content placement techniques cannot cope with such network dynamics since th...
Suk-Bok Lee, Starsky H. Y. Wong, Kang-Won Lee, Son...
TWC
2010
13 years 2 months ago
On the Impact of Channel Estimation Errors on MAC Protocols for MIMO Ad Hoc Networks
In this paper, we evaluate the performance of a Medium Access Control (MAC) protocol for MIMO ad hoc networks under imperfect channel estimation. To this end, we also present an an...
Davide Chiarotto, Paolo Casari, Michele Zorzi
SIGCOMM
2012
ACM
11 years 9 months ago
Revealing contact interval patterns in large scale urban vehicular ad hoc networks
Contact interval between moving vehicles is one of the key metrics in vehicular ad hoc networks (VANETs), which is important to routing schemes and network capacity. In this work,...
Yong Li, Depeng Jin, Pan Hui, Li Su, Lieguang Zeng
GLOBECOM
2006
IEEE
14 years 1 months ago
On the Performance of Access Strategies for MIMO Ad Hoc Networks
— In this paper, we address the impact of different access strategies in ad hoc networks with multiple antennas and MIMO communications. We employ a cross–layer designed MAC pr...
Marco Levorato, Paolo Casari, Michele Zorzi