Sciweavers

1373 search results - page 21 / 275
» Self-securing ad hoc wireless networks
Sort
View
PERCOM
2006
ACM
14 years 7 months ago
Topology-Transparent Schedules for Energy Limited Ad hoc Networks
Peter Dukes, Charles J. Colbourn, Violet R. Syroti...
PERCOM
2006
ACM
14 years 7 months ago
Adapting Distributed Hash Tables for Mobile Ad Hoc Networks
Tobias Heer, Stefan Götz, Simon Rieche, Klaus...
ICC
2009
IEEE
121views Communications» more  ICC 2009»
13 years 5 months ago
Throughput Scaling of Wireless Networks With Random Connections
This work studies the throughput scaling laws of ad hoc wireless networks in the limit of a large number of nodes. A random connections model is assumed in which the channel connec...
Shengshan Cui, Alexander M. Haimovich, Oren Somekh...
HICSS
2003
IEEE
211views Biometrics» more  HICSS 2003»
14 years 24 days ago
Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks
In this paper we propose a distributed intrusion detection system for ad hoc wireless networks based on mobile agent technology. Wireless networks are particularly vulnerable to i...
Oleg Kachirski, Ratan K. Guha