Sciweavers

273 search results - page 53 / 55
» Reputation-Based System for Encouraging the Cooperation of N...
Sort
View
ACNS
2011
Springer
241views Cryptology» more  ACNS 2011»
12 years 11 months ago
Misuse Detection in Consent-Based Networks
Consent-based networking, which requires senders to have permission to send traffic, can protect against multiple attacks on the network. Highly dynamic networks like Mobile Ad-hoc...
Mansoor Alicherry, Angelos D. Keromytis
IEICET
2008
136views more  IEICET 2008»
13 years 8 months ago
Delay Analysis of Car-to-Car Reliable Data Delivery Strategies Based on Data Mulling with Network Coding
Abstract--Vehicular ad hoc networks (VANET) aims to enhance vehicle navigation safety by providing an early warning system: any chance of accidents is informed through the wireless...
Joon-Sang Park, Uichin Lee, Soon-Young Oh, Mario G...
GLOBECOM
2009
IEEE
14 years 2 months ago
PreDA: Predicate Routing for DTN Architectures over MANET
—We consider a Delay Tolerant Network (DTN) whose users (nodes) are connected by an underlying Mobile Ad hoc Network (MANET) substrate. Users can declaratively express high-level...
Flavio Esposito, Ibrahim Matta
IJNSEC
2007
204views more  IJNSEC 2007»
13 years 7 months ago
Enhanced DSR for MANET with Improved Secured Route Discovery and QoS
Mobile Ad hoc NETwork (MANET) comprises of nodes, which are free to move randomly, yet cooperate to forward packets between source and destination over a multi-hop wireless networ...
Anil Rawat, Prakash Dattatraya Vyavahare, Ashwani ...
IWCMC
2006
ACM
14 years 1 months ago
Optimal hierarchical energy efficient design for MANETs
Due to the growing interest in mobile wireless Ad-Hoc networks’ (MANETs) applications, researchers have proposed many routing protocols that differ in their objective. Energy ef...
Wasim El-Hajj, Dionysios Kountanis, Ala I. Al-Fuqa...