Sciweavers

2691 search results - page 409 / 539
» Security in Ad Hoc Networks
Sort
View
OTM
2009
Springer
14 years 4 months ago
An Architecture for Dynamic Trust Monitoring in Mobile Networks
Collusion attacks remain a major problem of reputation and trust models, in mobile ad hoc networks. By covering up malicious behaviour of one another from the remaining part of the...
Olufunmilola Onolaja, Rami Bahsoon, Georgios Theod...
INFOCOM
2006
IEEE
14 years 4 months ago
A Packing Approach to Compare Slotted and Non-Slotted Medium Access Control
— In multi-hop ad hoc networks, the efficiency of a medium access control protocol under heavy traffic load depends mainly on its ability to schedule a large number of simultan...
Mathilde Durvy, Patrick Thiran
ENTCS
2006
109views more  ENTCS 2006»
13 years 10 months ago
An Overview of MANETs Simulation
Mobile Ad hoc NETworks (MANETs) are dynamic networks populated by mobile stations. Stations in MANETs are usually laptops, PDAs or mobile phones. These devices feature Bluetooth a...
Luc Hogie, Pascal Bouvry, Frédéric G...
AIMS
2008
Springer
14 years 4 months ago
Cooperation under Scarcity: The Sharer's Dilemma
Abstract. Many researchers have used game theory to study the problem of encouraging cooperation in peer-to-peer and mobile ad hoc networks, where resources are provided collective...
Michael Rogers, Saleem Bhatti
ICNS
2009
IEEE
14 years 4 months ago
A Macro View of Viral Propagation and Its Persistence in Heterogeneous Wireless Networks
Now that smart phones can interact with computers through various interface technologies such as Bluetooth, infrared, or the 802.11 family of IEEE specifications, they are workin...
Hoai-Nam Nguyen, Yoichi Shinoda