Sciweavers

1455 search results - page 192 / 291
» Policy-Based Mobile Ad Hoc Network Management
Sort
View
JPDC
2007
191views more  JPDC 2007»
13 years 9 months ago
Clustering wireless ad hoc networks with weakly connected dominating set
The increasing popular personal communications and mobile computing require a wireless network infrastructure that supports selfconfiguration and self-management. Efficient clus...
Bo Han, Weijia Jia
ICC
2007
IEEE
206views Communications» more  ICC 2007»
14 years 3 months ago
ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks
— In this paper, we present a novel anonymous secure routing protocol for mobile ad hoc networks (MANETs). The proposed protocol not only provides anonymity from all the intermed...
Xiaodong Lin, Rongxing Lu, Haojin Zhu, Pin-Han Ho,...
INFOCOM
2006
IEEE
14 years 3 months ago
A Statistical Framework for Intrusion Detection in Ad Hoc Networks
— We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically fail to detect attacks and also gener...
Dhanant Subhadrabandhu, Saswati Sarkar, Farooq Anj...
ICWMC
2006
IEEE
14 years 3 months ago
An Overview of MAC Protocols with Directional Antennas in Wireless ad hoc Networks
Although directional antennas have been used in mobile communications systems for quite a long time, realistic applications of directional or smart antennas in wireless ad hoc net...
Hongning Dai, Kam-Wing Ng, Min-You Wu
ICPPW
2002
IEEE
14 years 2 months ago
System Services for Implementing Ad-Hoc Routing Protocols
This paper explores several systems issues regarding the implementation of routing protocols for mobile ad-hoc networks. It proclaims that support for on-demand routing is insuf...
Vikas Kawadia, Yongguang Zhang, Binita Gupta