Sciweavers

1373 search results - page 44 / 275
» Self-securing ad hoc wireless networks
Sort
View
MOBIHOC
2005
ACM
14 years 7 months ago
Distributed low-cost backbone formation for wireless ad hoc networks
Yu Wang 0003, Weizhao Wang, Xiang-Yang Li
LCN
2006
IEEE
14 years 1 months ago
Accuracy-Speedup Tradeoffs for a Time-Parallel Simulation of Wireless Ad hoc Networks
We introduce a scalable algorithm for time-parallel simulations of wireless ad hoc networks and report on our results. Our approach decomposes the simulation into overlapping temp...
Guoqiang Wang, Damla Turgut, Ladislau Böl&oum...
WWIC
2007
Springer
221views Communications» more  WWIC 2007»
14 years 1 months ago
Detection of Packet Forwarding Misbehavior in Mobile Ad-Hoc Networks
Mobile Ad Hoc networks (MANETs) are susceptible to having their effective operation compromised by a variety of security attacks. Nodes may misbehave either because they are malici...
Oscar F. Gonzalez, Michael P. Howarth, George Pavl...
GI
2004
Springer
14 years 1 months ago
Providing Service Continuity in Ad Hoc Networks
: Most of the investigations on ad hoc protocols do not consider the fact that future wireless networks are capable to adapt their behaviour to the channel situation. These adaptin...
Erik Weiss, Bangnan Xu, Sven Hischke