Sciweavers

2691 search results - page 357 / 539
» Security in Ad Hoc Networks
Sort
View
INFOCOM
2007
IEEE
14 years 4 months ago
Service Time Approximation in IEEE 802.11 Single-Hop Ad-hoc Networks
Abstract— This paper investigates the near-memoryless behavior of the service time for IEEE 802.11 saturated single-hop ad hoc networks. We show that the number of packets succes...
Atef Abdrabou, Weihua Zhuang
ICDE
2006
IEEE
149views Database» more  ICDE 2006»
14 years 4 months ago
Seaweed: Distributed Scalable Ad Hoc Querying
Many emerging applications such as wide-area network management need to query large, structured, highly distributed datasets. Seaweed is a distributed scalable infrastructure for ...
Richard Mortier, Dushyanth Narayanan, Austin Donne...
CIIT
2007
161views Communications» more  CIIT 2007»
13 years 12 months ago
Using a two-timer scheme to detect selfish nodes in mobile ad-hoc networks
The cooperation of wireless nodes in ad hoc networks is crucial to ensure the proper working of the whole network due to the absence of infrastructure. Misbehaving nodes can drama...
H. Lui, José G. Delgado-Frias, Sirisha Medi...
ICC
2007
IEEE
179views Communications» more  ICC 2007»
14 years 4 months ago
An Improved Vehicular Ad Hoc Routing Protocol for City Environments
—The fundamental component for the success of VANET (Vehicular Ad hoc NETworks) applications is routing since it must efficiently handle rapid topology changes and a fragmented n...
Moez Jerbi, Sidi-Mohammed Senouci, Rabah Meraihi, ...
CCS
2003
ACM
14 years 3 months ago
Incentive-based modeling and inference of attacker intent, objectives, and strategies
Although the ability to model and infer Attacker Intent, Objectives and Strategies (AIOS) may dramatically advance the literature of risk assessment, harm prediction, and predicti...
Peng Liu, Wanyu Zang