Sciweavers

1540 search results - page 250 / 308
» Self-Configuring and Optimizing Mobile Ad Hoc Networks
Sort
View
MOBIQUITOUS
2005
IEEE
14 years 3 months ago
SWAT: Small World-based Attacker Traceback in Ad-hoc Networks
Mobile Ad hoc NETworks (MANETs) provide a lot of promise for many practical applications. However, MANETs are vulnerable to a number of attacks due to its autonomous nature. DoS/D...
Yongjin Kim, Ahmed Helmy
GLOBECOM
2010
IEEE
13 years 8 months ago
Risk-Aware Response for Mitigating MANET Routing Attacks
Mobile Ad hoc Networks (MANET) have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received co...
Ziming Zhao, Hongxin Hu, Gail-Joon Ahn, Ruoyu Wu
MIDDLEWARE
2005
Springer
14 years 3 months ago
Middleware for protocol-based coordination in dynamic networks
Pervasive and ad hoc computing applications are frequently deployed in dynamic networks. Due to mobility of the computing nodes, their unreliability, or a limited communication ra...
Kurt Schelfthout, Danny Weyns, Tom Holvoet
LCN
2003
IEEE
14 years 3 months ago
Reliable Multipath Routing with Fixed Delays in MANET Using Regenerating Nodes
This paper proposes a new framework in mobile ad hoc networks (MANET) for reliable multipath routing with fixed delays based on packet level Forward Error Control (FEC). The nove...
Rui Ma, Jacek Ilow
ISORC
2007
IEEE
14 years 4 months ago
Data Dissemination for Wireless Sensor Networks
Due to the special characteristics (limited battery power, limited computing capability, low bandwidth, need to collect sensor data from multiple fixed-location source nodes to a...
Min-Gu Lee, Sunggu Lee