Sciweavers

775 search results - page 78 / 155
» Secure Service Provision in Ad Hoc Networks
Sort
View
ICPPW
2006
IEEE
14 years 5 months ago
m-LPN: An Approach Towards a Dependable Trust Model for Pervasive Computing Applications
Trust, the fundamental basis of ‘cooperation’ – one of the most important characteristics for the performance of pervasive ad hoc network-- is under serious threat with the ...
Munirul M. Haque, Sheikh Iqbal Ahamed
ADHOC
2006
155views more  ADHOC 2006»
13 years 11 months ago
Application versus network layer multicasting in ad hoc networks: the ALMA routing protocol
Application layer multicasting has emerged as an appealing alternative to network layer multicasting in wireline networks. Here, we examine the suitability of application layer mu...
Min Ge, Srikanth V. Krishnamurthy, Michalis Falout...
CORR
2011
Springer
536views Education» more  CORR 2011»
13 years 6 months ago
Performance Analysis of AODV under Black Hole Attack through Use of OPNET Simulator
— Mobile ad hoc networks (MANETs) are dynamic wireless networks without any infrastructure. These networks are weak against many types of attacks. One of these attacks is the bla...
H. A. Esmaili, M. R. Khalili Shoja, Hossein Gharae...
TWC
2008
176views more  TWC 2008»
13 years 11 months ago
Asynchronous distributed power and rate control in ad hoc networks: a game-theoretic approach
This paper analyzes distributed asynchronous power and rate control for wireless ad hoc networks. Importantly, all network transmitters are considered to be independent of any mana...
Stepán Kucera, Sonia Aïssa, Koji Yamam...
TMC
2008
110views more  TMC 2008»
13 years 11 months ago
Bandwidth Estimation for IEEE 802.11-Based Ad Hoc Networks
Since 2005, IEEE 802.11-based networks have been able to provide a certain level of quality of service (QoS) by the means of service differentiation, due to the IEEE 802.11e amendm...
Cheikh Sarr, Claude Chaudet, Guillaume Chelius, Is...