Sciweavers

2691 search results - page 433 / 539
» Security in Ad Hoc Networks
Sort
View
MSWIM
2003
ACM
14 years 3 months ago
Connectivity of wireless multihop networks in a shadow fading environment
This article analyzes the connectivity of multihop radio networks in a log-normal shadow fading environment. Assuming the nodes have equal transmission capabilities and are randoml...
Christian Bettstetter, Christian Hartmann
ADHOC
2007
73views more  ADHOC 2007»
13 years 10 months ago
A survey on real-world implementations of mobile ad-hoc networks
Simulation and emulation are valuable techniques for the evaluation of algorithms and protocols used in mobile ad-hoc networks. However, these techniques always require the simpli...
Wolfgang Kieß, Martin Mauve
TCOM
2010
131views more  TCOM 2010»
13 years 4 months ago
An Overview of the Transmission Capacity of Wireless Networks
Abstract--This paper surveys and unifies a number of recent contributions that have collectively developed a metric for decentralized wireless network analysis known as transmissio...
Steven Weber, Jeffrey G. Andrews, Nihar Jindal
ADHOCNOW
2008
Springer
13 years 11 months ago
Cheating on the CW and RTS/CTS Mechanisms in Single-Hop IEEE 802.11e Networks
This paper presents a work in progress which deals with the problem of node misbehaviour in ad-hoc networks. A realistic approach is used to determine the impact of contention wind...
Szymon Szott, Marek Natkaniec, Andrzej R. Pach
CORR
1998
Springer
100views Education» more  CORR 1998»
13 years 9 months ago
Push vs. Pull in Web-Based Network Management
In this paper, we build on the concept of embedded management application, proposed by Wellens and Auerbach, and present two models of network management application designs that ...
Jean-Philippe Martin-Flatin