Sciweavers

662 search results - page 36 / 133
» Secure data transmission in mobile ad hoc networks
Sort
View
MOBICOM
2003
ACM
14 years 25 days ago
Towards realistic mobility models for mobile ad hoc networks
One of the most important methods for evaluating the characteristics of ad hoc networking protocols is through the use of simulation. Simulation provides researchers with a number...
Amit P. Jardosh, Elizabeth M. Belding-Royer, Kevin...
IPPS
2008
IEEE
14 years 2 months ago
A game theoretical data replication technique for mobile ad hoc networks
Adaptive replication of data items on servers of a mobile ad hoc network can alleviate access delays. The selection of data items and servers requires solving a constrained optimi...
Samee Ullah Khan, Anthony A. Maciejewski, Howard J...
ICITA
2005
IEEE
14 years 1 months ago
p-MANET: Efficient Power Saving Protocol for Multi-Hop Mobile Ad Hoc Networks
In this paper, we propose an efficient power saving protocol for multi-hop mobile ad hoc networks, called p-MANET. Our design is expected as a new foundation MAC layer power savin...
Chiung-Ying Wang, Chi-Jen Wu, Guan-Nan Chen, Ren-H...
WWW
2004
ACM
14 years 8 months ago
SPT-based topology algorithm for constructing power efficient wireless ad hoc networks
In this paper, we present a localized Shortest Path Tree (SPT) based algorithm for constructing a sub-network with the minimum-energy property for a given wireless ad hoc network....
Szu-Chi Wang, David S. L. Wei, Sy-Yen Kuo
ISCC
2002
IEEE
147views Communications» more  ISCC 2002»
14 years 15 days ago
Self-securing ad hoc wireless networks
Mobile ad hoc networking offers convenient infrastructureless communication over the shared wireless channel. However, the nature of ad hoc networks makes them vulnerable to secur...
Haiyun Luo, Petros Zerfos, Jiejun Kong, Songwu Lu,...