Sciweavers

1373 search results - page 150 / 275
» Self-securing ad hoc wireless networks
Sort
View
SASN
2003
ACM
14 years 3 months ago
Secure multicast groups on ad hoc networks
In this paper we address the problem of secure multicast of data streams over a multihop wireless ad hoc network. We propose a dynamic multicast group management protocol that aim...
Tansel Kaya, Guolong Lin, Guevara Noubir, A. Yilma...
AP2PC
2003
Springer
14 years 3 months ago
Mobile Agents for Locating Documents in Ad Hoc Networks
The wide availability of mobile devices equipped with wireless communication capabilities together with the technical possibility to form adhoc networks paves the way for building ...
Khaled Nagi, Iman Elghandour, Birgitta König-...
MOBIHOC
2002
ACM
14 years 9 months ago
Message-optimal connected dominating sets in mobile ad hoc networks
A connected dominating set (CDS) for a graph G(V, E) is a subset V of V , such that each node in V - V is adjacent to some node in V , and V induces a connected subgraph. A CDS ha...
Khaled M. Alzoubi, Peng-Jun Wan, Ophir Frieder
ICC
2008
IEEE
130views Communications» more  ICC 2008»
14 years 4 months ago
A Polynomial-Time Approximation Algorithm for Weighted Sum-Rate Maximization in UWB Networks
— Scheduling in an ad hoc wireless network suffers from the non-convexity of the cost function, caused by the interference between communication links. In previous optimization t...
Gyouhwan Kim, Qiao Li, Rohit Negi
ICC
2008
IEEE
112views Communications» more  ICC 2008»
14 years 4 months ago
Throughput Optimization for Hierarchical Cooperation in Ad Hoc Networks
—For a wireless network with ¢ nodes distributed in an area £ , with ¢ source-destination pairs communicating with each other at some common rate, the hierarchical cooperation...
Javad Ghaderi, Liang-Liang Xie, Xuemin Shen