Sciweavers

375 search results - page 64 / 75
» Probabilistic quorum systems in wireless ad hoc networks
Sort
View
CORR
2007
Springer
92views Education» more  CORR 2007»
13 years 7 months ago
Throughput Scaling in Random Wireless Networks: A Non-Hierarchical Multipath Routing Strategy
— Franceschetti et al. [1] have recently shown that per-node throughput in an extended (i.e., geographically expanding), ad hoc wireless network with Θ(n) randomly distributed n...
Awlok Josan, Mingyan Liu, David L. Neuhoff, S. San...
PERCOM
2008
ACM
14 years 7 months ago
Non-anchored Unified Naming for Ubiquitous Computing Environments
Users and developers require some way to identify by human readable names the many resources that comprise a ubiquitous computing environment. In addition, naming in such environm...
Yoo Chul Chung, Dongman Lee
CSREASAM
2006
13 years 9 months ago
Agent-based Distributed Intrusion Detection Methodology for MANETs
Intrusion detection, as a complementary mechanism to intrusion prevention, is necessary to secure wireless Mobile Ad hoc Networks (MANETs). In this paper we propose a practical age...
Hongmei Deng, Roger Xu, Frank Zhang, Chiman Kwan, ...
MOBIHOC
2008
ACM
14 years 7 months ago
An O(log n) dominating set protocol for wireless ad-hoc networks under the physical interference model
Dealing with interference is one of the primary challenges to solve in the design of protocols for wireless ad-hoc networks. Most of the work in the literature assumes localized o...
Christian Scheideler, Andréa W. Richa, Paol...
PEWASUN
2004
ACM
14 years 1 months ago
A performance evaluation framework for IEEE 802.11 ad-hoc networks
Interferences in an ad-hoc network can be defined as a set of constraints that specify which groups of nodes cannot transmit simultaneously, and they have significant implications...
Ping Chung Ng, Soung Chang Liew, Li Bin Jiang