Sciweavers

1373 search results - page 184 / 275
» Self-securing ad hoc wireless networks
Sort
View
MOBIHOC
2002
ACM
14 years 8 months ago
Weak duplicate address detection in mobile ad hoc networks
Auto-configuration is a desirable goal in implementing mobile ad hoc networks. Specifically, automated dynamic assignment (without manual intervention) of IP addresses is desirabl...
Nitin H. Vaidya
JPDC
2007
112views more  JPDC 2007»
13 years 8 months ago
Distributed algorithms for connected domination in wireless networks
We present fast distributed local control Connected Dominating Set (CDS) algorithms for wireless ad hoc networks. We present two randomized distributed algorithms, CDSColor and CD...
Rajiv Gandhi, Srinivasan Parthasarathy 0002
INFOCOM
2002
IEEE
14 years 1 months ago
Joint Scheduling and Power Control for Wireless Ad-hoc Networks
—In this paper, we introduce a cross-layer design framework to the multiple access problem in contention-based wireless ad hoc networks. The motivation for this study is twofold,...
Tamer A. ElBatt, Anthony Ephremides
SPW
2000
Springer
14 years 14 days ago
The Resurrecting Duckling - What Next?
In the context of the security of wireless ad hoc networks, we previously explored the problem of secure transient association between a master and a slave device in the absence of...
Frank Stajano
EVOW
2009
Springer
14 years 3 months ago
Wireless Communications for Distributed Navigation in Robot Swarms
We consider a swarm of robots equipped with an infrared range and bearing device that is able both to make estimates of the relative distance and angle between two robots in line-o...
Gianni A. Di Caro, Frederick Ducatelle, Luca Maria...