Sciweavers

1373 search results - page 69 / 275
» Self-securing ad hoc wireless networks
Sort
View
ICDCSW
2005
IEEE
14 years 1 months ago
Increasing Attack Resiliency of Wireless Ad Hoc and Sensor Networks
An ad hoc or sensor network that is employed for security sensitive applications is expected to tolerate a certain quantity of maliciously behaving nodes. Algorithms must be desig...
Harald Vogt
IWCMC
2006
ACM
14 years 1 months ago
A distributed load-based transmission scheduling protocol for wireless ad hoc networks
This paper presents a load-based transmission scheduling (LoBaTS) protocol for wireless ad hoc networks. Since terminals in these networks may be required to forward unequal amoun...
Brian J. Wolf, Joseph L. Hammond, Harlan B. Russel...
ICC
2007
IEEE
124views Communications» more  ICC 2007»
14 years 2 months ago
Emulating End-to-End Losses and Delays for Ad Hoc Networks
— Ad hoc networks have gained place in the research area recently. There are many researches regarding different topics related to such networks, such as routing, media access co...
Alaa Seddik-Ghaleb, Yacine Ghamri-Doudane, Sidi-Mo...
IDEAS
2002
IEEE
223views Database» more  IDEAS 2002»
14 years 18 days ago
Energy-Efficient Data Broadcasting in Mobile Ad-Hoc Networks
Energy saving is the most important issue in wireless mobile computing due to power constraints on mobile units. Data broadcasting is the main method of information dissemination ...
Le Gruenwald, Muhammad Javed, Meng Gu
MASCOTS
2003
13 years 9 months ago
Multipath Routing in Mobile Ad Hoc Networks: Issues and Challenges
Mobile ad hoc networks (MANETs) consist of a collection of wireless mobile nodes which dynamically exchange data among themselves without the reliance on a fixed base station or a...
Stephen Mueller, Rose P. Tsang, Dipak Ghosal