Sciweavers

1373 search results - page 42 / 275
» Self-securing ad hoc wireless networks
Sort
View
ICDCSW
2000
IEEE
14 years 5 hour ago
A Link Availability Prediction Model for Wireless Ad Hoc Networks
Dajiang He, Shengming Jiang, Jianqiang Rao
ALGOSENSORS
2006
Springer
13 years 11 months ago
Minimizing Interference of a Wireless Ad-Hoc Network in a Plane
Magnús M. Halldórsson, Takeshi Tokuy...
AINA
2011
IEEE
12 years 11 months ago
Identity Support in a Security and Trust Service for Ad Hoc M-commerce Trading Systems
– Ad hoc m-commerce is an emerging way of conducting online trading wirelessly within dynamic network communities. However, participants in such systems are vulnerable to attacks...
Husna Osman, Hamish Taylor
GLOBECOM
2006
IEEE
14 years 1 months ago
Efficient Construction of Weakly-Connected Dominating Set for Clustering Wireless Ad Hoc Networks
In most of the proposed clustering algorithms for wireless ad hoc networks, the cluster-heads form a dominating set in the network topology. A variant of dominating set which is mo...
Bo Han, Weijia Jia
SAGA
2007
Springer
14 years 1 months ago
Randomized Algorithms and Probabilistic Analysis in Wireless Networking
Abstract. Devices connected wirelessly, in various forms including computers, hand-held devices, ad hoc networks, and embedded systems, are expected to become ubiquitous all around...
Aravind Srinivasan