Sciweavers

2691 search results - page 440 / 539
» Security in Ad Hoc Networks
Sort
View
CLUSTER
2011
IEEE
12 years 10 months ago
A mobility-based cluster formation algorithm for wireless mobile ad-hoc networks
  In the last decade, numerous efforts have been devoted to design efficient algorithms for clustering the  wireless mobile ad‐hoc networks (MANET) consider...
Javad Akbari Torkestani, Mohammad Reza Meybodi
SUTC
2010
IEEE
14 years 1 months ago
Pollution Attack Defense for Coding Based Sensor Storage
—We present a novel information theoretic approach to make network coding based storage secure against pollution attacks in sensor networks. The approach is based on a new decodi...
Levente Buttyán, Laszlo Czap, István...
PERCOM
2005
ACM
14 years 9 months ago
EZCab: A Cab Booking Application Using Short-Range Wireless Communication
EZCab is a proof-of-concept ubiquitous computing application that allows people to book nearby cabs using their cell phones or PDAs equipped with short-range wireless network inte...
Peng Zhou, Tamer Nadeem, Porlin Kang, Cristian Bor...
ICALT
2008
IEEE
14 years 4 months ago
A Pervasive Assessment System: Extending QTI to Incorporate Ad-hoc Wireless Sensors
Ad-hoc sensor networks provide a cheap and scalable technology for constructing pervasive learning assessment systems that are embedded in physical environments. This paper propos...
Imran A. Zualkernan, Ahmed Wasfy, Imad Zabalawi, M...
WIMOB
2008
IEEE
14 years 4 months ago
Cross-Layer Self Routing: A Self-Managed Routing Approach for MANETs
—Mobile ad hoc networks (MANETs) generally adopt a peer-to-peer architecture in which the nodes themselves provide routing and services to the network. Disconnectivity with peer ...
Mohammad Abdur Razzaque, Simon Dobson, Paddy Nixon