Sciweavers

1455 search results - page 124 / 291
» Policy-Based Mobile Ad Hoc Network Management
Sort
View
ADHOCNOW
2004
Springer
14 years 3 months ago
Weathering the Storm: Managing Redundancy and Security in Ad Hoc Networks
Many ad hoc routing algorithms rely on broadcast flooding for location discovery or more generally for secure routing applications, particularly when dealing with Byzantine threat...
Mike Burmester, Tri Van Le, Alec Yasinsac
ICIP
2006
IEEE
14 years 12 months ago
Multi Source Streaming for Robust Video Transmission in Mobile Ad-Hoc Networks
Video transmission over networks is getting increasingly important, thus upcoming network types like Mobile Ad-Hoc Networks (MANETs) can also become a suitable platform for exchan...
Cornelius Hellge, Karsten Gänger, Thomas Schi...
LCN
2008
IEEE
14 years 4 months ago
Key revocation based on Dirichlet multinomial model for mobile ad hoc networks
— The absence of an online trusted authority makes the issue of key revocation in mobile ad hoc networks (MANETs) particularly challenging. In this paper, we present a novel self...
Xinxin Fan, Guang Gong
PERCOM
2009
ACM
14 years 11 months ago
Mobile Ad Hoc Networks: the DHT paradigm
In this paper, a DHT-based routing protocol which integrates at the network layer both traditional direct routing, i.e. MANET routing, and indirect key-based routing, i.e. P2P rout...
Marcello Caleffi
CORR
2011
Springer
207views Education» more  CORR 2011»
13 years 1 months ago
Ergodic Transmission Capacity of Wireless Ad Hoc Networks with Interference Management
Most work on wireless network throughput ignores the temporal correlation inherent to wireless channels because it degrades tractability. To better model and quantify the temporal...
Chun-Hung Liu, Jeffrey G. Andrews