Sciweavers

662 search results - page 86 / 133
» Secure data transmission in mobile ad hoc networks
Sort
View
INFOCOM
2012
IEEE
11 years 11 months ago
Capacity of distributed content delivery in large-scale wireless ad hoc networks
—In most existing wireless networks, end users obtain data content from the wired network, typically, the Internet. In this manner, virtually all of their traffic must go throug...
Wang Liu, Kejie Lu, Jianping Wang, Yi Qian, Tao Zh...
CORR
2010
Springer
91views Education» more  CORR 2010»
13 years 8 months ago
Shadowing Effects on Routing Protocol of Multihop Ad Hoc Networks
Two-ray ground reflection model has been widely used as the propagation model to investigate the performance of an ad hoc network. But two-ray model is too simple to represent a r...
Anwar Hossain, Mohammed Tarique, Rumana Islam
ADHOC
2008
132views more  ADHOC 2008»
13 years 9 months ago
Defending against cache consistency attacks in wireless ad hoc networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, the issue of cache consistency must be addres...
Wensheng Zhang, Guohong Cao
NETWORKING
2004
13 years 10 months ago
Combining Source- and Localized Recovery to Achieve Reliable Multicast in Multi-hop Ad Hoc Networks
This paper proposes a novel reliable multicast transport protocol for multi-hop, wireless ad hoc networks (or MANETs). To recover from the different types of losses that may occur ...
Venkatesh Rajendran, Katia Obraczka, Yunjung Yi, S...
MOBIQUITOUS
2005
IEEE
14 years 2 months ago
Defend Against Cache Consistency Attacks in Wireless Ad Hoc Networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, cache consistency issues must be addressed. T...
Wensheng Zhang, Guohong Cao