Sciweavers

278 search results - page 29 / 56
» Performance of a Jini-based Ad Hoc Network Authentication Sc...
Sort
View
ADHOC
2005
102views more  ADHOC 2005»
13 years 7 months ago
Localized LMST and RNG based minimum-energy broadcast protocols in ad hoc networks
In the minimum energy broadcasting problem, each node adjusts its transmission power to minimize the total energy consumption while still guaranteeing the full coverage of the net...
Julien Cartigny, François Ingelrest, David ...
GLOBECOM
2008
IEEE
14 years 1 months ago
Routing with Probabilistic Delay Guarantees in Wireless Ad-Hoc Networks
—In many wireless ad-hoc networks it is important to find a route that delivers a message to the destination within a certain deadline (delay constraint). We propose to identify...
Matthew Brand, Petar Maymounkov, Andreas F. Molisc...
WICON
2008
13 years 8 months ago
Towards distributed network classification for mobile ad hoc networks
Mobile ad hoc networks range from traditional MANETs where end-to-end paths exist from sources to destinations, to DTNs where no contemporaneous end-to-end paths exist and communi...
Dimitrios Antonellis, Ahmed Mansy, Konstantinos Ps...
IWCMC
2006
ACM
14 years 1 months ago
Priority-based receiver-side relay election in wireless ad hoc sensor networks
Receiver-side relay election has been recently proposed as an alternative to transmitter-side relay selection in wireless ad hoc networks. In this paper we study different priori...
Komlan Egoh, Swades De
ATVA
2005
Springer
156views Hardware» more  ATVA 2005»
14 years 25 days ago
An EFSM-Based Intrusion Detection System for Ad Hoc Networks
Mobile ad hoc networks offer very interesting perspectives in wireless communications due to their easy deployment and their growing performances. However, due to their inherent c...
Jean-Marie Orset, Baptiste Alcalde, Ana R. Cavalli