Sciweavers

297 search results - page 36 / 60
» Proposal and evaluation of an application level caching sche...
Sort
View
IJSN
2007
120views more  IJSN 2007»
13 years 7 months ago
On the design of secure protocols for hierarchical sensor networks
Wireless sensor networks (WSNs) are ad hoc networks comprised mainly of small sensor nodes with limited resources, and can be used to monitor areas of interest. In this paper, we p...
Leonardo B. Oliveira, Hao Chi Wong, Antonio Alfred...
JSAC
2011
171views more  JSAC 2011»
13 years 2 months ago
CodeOn: Cooperative Popular Content Distribution for Vehicular Networks using Symbol Level Network Coding
—Driven by both safety concerns and commercial interests, one of the key services offered by vehicular networks is popular content distribution (PCD). The fundamental challenges ...
Ming Li, Zhenyu Yang, Wenjing Lou
MOBIHOC
2003
ACM
14 years 7 months ago
A MAC protocol for full exploitation of directional antennas in ad-hoc wireless networks
Directional antennas in ad hoc networks offer many benefits compared with classical omnidirectional antennas. The most important include significant increase of spatial reuse, cov...
Thanasis Korakis, Gentian Jakllari, Leandros Tassi...
INFOCOM
2007
IEEE
14 years 1 months ago
A Suite of Schemes for User-Level Network Diagnosis without Infrastructure
—It is highly desirable and important for end users, with no special privileges, identify and pinpoint faults inside the network that degrade the performance of their application...
Yao Zhao, Yan Chen
HICSS
2010
IEEE
222views Biometrics» more  HICSS 2010»
13 years 9 months ago
Application-Layer Intrusion Detection in MANETs
— Security has become important to mobile ad hoc networks (MANETs) due mainly to their use for many missionand life-critical applications. However, the broadcast nature of inter-...
Katharine Chang, Kang G. Shin