Sciweavers

2691 search results - page 493 / 539
» Security in Ad Hoc Networks
Sort
View
JSAC
2007
224views more  JSAC 2007»
13 years 9 months ago
AMOEBA: Robust Location Privacy Scheme for VANET
Abstract— Communication messages in vehicular ad hoc networks (VANET) can be used to locate and track vehicles. While tracking can be beneficial for vehicle navigation, it can a...
Krishna Sampigethaya, Mingyan Li, Leping Huang, Ra...
INFOCOM
2011
IEEE
13 years 1 months ago
Optimal multicast capacity and delay tradeoffs in MANETs: A global perspective
—In this paper, we give a global perspective of multicast capacity and delay analysis in Mobile Ad-hoc Networks (MANETs). Specifically, we consider two node mobility models: (1)...
Yun Wang, Xiaoyu Chu, Xinbing Wang, Yu Cheng
ICC
2011
IEEE
253views Communications» more  ICC 2011»
12 years 9 months ago
Geo-Assisted Multicast Inter-Domain Routing (GMIDR) Protocol for MANETs
Abstract— Large military ad hoc networks are often characterized by the interconnection of heterogeneous domains. The same trend is emerging in civilian MANETs (e.g., search and ...
Konglin Zhu, Biao Zhou, Xiaoming Fu, Mario Gerla
MSWIM
2005
ACM
14 years 3 months ago
Huginn: a 3D visualizer for wireless ns-2 traces
Discrete-event network simulation is a major tool for the research and development of mobile ad-hoc networks (MANETs). These simulations are used for debugging, teaching, understa...
Björn Scheuermann, Holger Füßler, ...
CISIS
2008
IEEE
13 years 12 months ago
Simplified Bluetooth Scatternet Formation Using Maximal Independent Sets
Bluetooth standard allows the creation of piconets, with one node serving as its master and up to seven nodes serving as slaves. A Bluetooth ad hoc network can also be formed by in...
Nejib Zaguia, Ivan Stojmenovic, Yassine Daadaa