Sciweavers

662 search results - page 60 / 133
» Secure data transmission in mobile ad hoc networks
Sort
View
GLOBECOM
2006
IEEE
14 years 2 months ago
Defense against Routing Disruption Attacks in Mobile Ad Hoc Networks
—We propose a secure routing architecture for Mobile Ad hoc NETworks (MANETs) called ThroughpUt-Feedback (TUF) routing, which is resilient against a wide range of routing disrupt...
Ruiliang Chen, Michael Snow, Jung Min Park, M. Tam...
ICC
2007
IEEE
132views Communications» more  ICC 2007»
14 years 3 months ago
Topology Reconstruction and Characterisation of Wireless Ad Hoc Networks
Abstract— Wireless ad hoc networks provide a useful communications infrastructure for the mobile battlefield. In this paper we apply and develop passive radio frequency signal s...
Jon Arnold, Nigel Bean, Miro Kraetzl, Matthew Roug...
PERCOM
2009
ACM
14 years 3 months ago
BitHoc: A content sharing application for Wireless Ad hoc Networks
—As a result of the wide spread of new efficient mobile communication devices, users are more and more willing to find on these devices (PDAs, Smartphones, etc) applications si...
Amir Krifa, Mohamed Karim Sbai, Chadi Barakat, Thi...
AINA
2005
IEEE
14 years 2 months ago
A Biologically Inspired QoS Routing Algorithm for Mobile Ad Hoc Networks
— This paper presents an Emergent Ad hoc Routing Algorithm with QoS provision (EARA-QoS). This ad hoc QoS routing algorithm is based on a swarm intelligence inspired routing infr...
Zhenyu Liu, Marta Z. Kwiatkowska, Costas C. Consta...
MDM
2001
Springer
209views Communications» more  MDM 2001»
14 years 1 months ago
Energy-Efficient Transaction Management for Real-Time Mobile Databases in Ad-Hoc Network Environments
In an ad-hoc mobile network architecture, all the mobile hosts (MHs) are connected with each other through a wireless network that has a frequently changing topology. This type of ...
Le Gruenwald, Shankar M. Banik