Sciweavers

2691 search results - page 365 / 539
» Security in Ad Hoc Networks
Sort
View
ICC
2009
IEEE
121views Communications» more  ICC 2009»
13 years 8 months ago
Throughput Scaling of Wireless Networks With Random Connections
This work studies the throughput scaling laws of ad hoc wireless networks in the limit of a large number of nodes. A random connections model is assumed in which the channel connec...
Shengshan Cui, Alexander M. Haimovich, Oren Somekh...
MOBICOM
2000
ACM
14 years 2 months ago
A scalable location service for geographic ad hoc routing
GLS is a new distributed location service which tracks mobile node locations. GLS combined with geographic forwarding allows the construction of ad hoc mobile networks that scale ...
Jinyang Li, John Jannotti, Douglas S. J. De Couto,...
INFOCOM
2008
IEEE
14 years 4 months ago
Throughput Anonymity Trade-off in Wireless Networks under Latency Constraints
—Providing anonymity to routes in a wireless ad hoc network from passive eavesdroppers is considered. Using Shannon’s equivocation as an information theoretic measure of anonym...
Parvathinathan Venkitasubramaniam, Lang Tong
PERCOM
2004
ACM
14 years 10 months ago
Learning to Detect User Activity and Availability from a Variety of Sensor Data
Using a networked infrastructure of easily available sensors and context-processing components, we are developing applications for the support of workplace interactions. Notions o...
Dave Snowdon, Jean-Luc Meunier, Martin Mühlen...
ICDCSW
2006
IEEE
14 years 4 months ago
On the Use of Nodes with Controllable Mobility for Conserving Power in MANETs
We explore the idea of using relay nodes with controllable mobility as intermediate hops for reducing the power consumption in a mobile ad hoc network (MANET). We formulate the re...
Eashwar R. Chittimalla, Aravindhan Venkateswaran, ...