Sciweavers

2691 search results - page 427 / 539
» Security in Ad Hoc Networks
Sort
View
CORR
2008
Springer
103views Education» more  CORR 2008»
13 years 10 months ago
Path Loss Exponent Estimation in Large Wireless Networks
In wireless channels, the path loss exponent (PLE) has a strong impact on the quality of the links, and hence, it needs to be accurately estimated for the efficient design and oper...
Sunil Srinivasa, Martin Haenggi
IADIS
2003
13 years 11 months ago
DENOFAS: A Vulnerability Assessment Tool
This paper describes the development of a software tool for detection of vulnerabilities in networked systems, using public available security resources. Our tool builds is knowle...
Rui Costa Cardoso, Mário M. Freire
PERCOM
2009
ACM
14 years 10 months ago
P2P over MANET: Indirect Tree-based Routing
Abstract--Mobile Ad hoc NETworks (MANET) and Peer-ToPeer (P2P) systems are emerging technologies sharing a common underlying decentralized networking paradigm. However, the related...
Marcello Caleffi, Luigi Paura
ICPADS
2008
IEEE
14 years 4 months ago
Query Management in a Sensor Environment
Traditional sensor network deployments consisted of fixed infrastructures and were relatively small in size. More and more, we see the deployment of ad-hoc sensor networks with h...
Martin F. O'Connor, Vincent Andrieu, Mark Roantree
DEXA
2008
Springer
98views Database» more  DEXA 2008»
13 years 12 months ago
REALM: Replication of Data for a Logical Group Based MANET Database
Abstract. Mobile Ad-Hoc Networks, or MANETs, provide communication between free-roaming mobile hosts without a fixed infrastructure. These MANETs operate under conditions of limite...
Anita Vallur, Le Gruenwald, Nick Hunter