Sciweavers

1373 search results - page 90 / 275
» Self-securing ad hoc wireless networks
Sort
View
ICPPW
2002
IEEE
14 years 20 days ago
Robust Routing in Wireless Ad Hoc Networks
A wireless ad hoc network is a collection of mobile nodes with no fixed infrastructure. The absence of central authorization facility in dynamic and distributed environment requir...
Seungjoon Lee, Bohyung Han, Minho Shin
INFOCOM
2002
IEEE
14 years 20 days ago
Distributed Construction of Connected Dominating Set in Wireless Ad Hoc Networks
—Connected dominating set (CDS) has been proposed as virtual backbone or spine of wireless ad hoc networks. Three distributed approximation algorithms have been proposed in the l...
Peng-Jun Wan, Khaled M. Alzoubi, Ophir Frieder
ADHOC
2008
132views more  ADHOC 2008»
13 years 7 months ago
Defending against cache consistency attacks in wireless ad hoc networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, the issue of cache consistency must be addres...
Wensheng Zhang, Guohong Cao
ADHOC
2005
122views more  ADHOC 2005»
13 years 7 months ago
Bandwidth guaranteed call admission in TDMA/CDMA ad hoc wireless networks
This paper first studied the timeslot assignment problem in time division multiple access/code division multiple access (TDMA/CDMA) wireless ad hoc networks. Given a path P, we pr...
Hai Liu, Xiaohua Jia, Deying Li, Chan-Hee Lee
ADHOC
2006
87views more  ADHOC 2006»
13 years 7 months ago
Medium Access Control protocols for ad hoc wireless networks: A survey
Studies of ad hoc wireless networks are a relatively new field gaining more popularity for various new applications. In these networks, the Medium Access Control (MAC) protocols a...
Sunil Kumar, Vineet S. Raghavan, Jing Deng