Sciweavers

566 search results - page 51 / 114
» Trust Establishment in Ad Hoc and Sensor Networks
Sort
View
GLOBECOM
2007
IEEE
14 years 2 months ago
Bridging Distributed Hash Tables in Wireless Ad-Hoc Networks
—The adaptation of structured P2P networks, i.e. Distributed Hash Tables (DHTs), to wireless ad-hoc networks has been investigated in recent years. Existing work assume all peers...
Lawrence Cheng
GLOBECOM
2007
IEEE
14 years 2 months ago
On the Design of Future Wireless Ad Hoc Networks
— In this paper, we study the design of future wireless ad hoc networks. Particularly, we consider that the future wireless ad hoc networks shall be able to efficiently provide ...
Kejie Lu, Shengli Fu, Tao Zhang, Yi Qian
MOBIHOC
2003
ACM
14 years 7 months ago
Mobility helps security in ad hoc networks
Contrary to the common belief that mobility makes security more difficult to achieve, we show that node mobility can, in fact, be useful to provide security in ad hoc networks. We...
Jean-Pierre Hubaux, Levente Buttyán, Srdjan...
CORR
2007
Springer
126views Education» more  CORR 2007»
13 years 7 months ago
Rethinking Information Theory for Mobile Ad Hoc Networks
The subject of this article is the long standing open problem of developing a general capacity theory for wireless networks, particularly a theory capable of describing the fundam...
Jeffrey G. Andrews, Nihar Jindal, Martin Haenggi, ...
GECCO
2008
Springer
146views Optimization» more  GECCO 2008»
13 years 8 months ago
A formal performance modeling framework for bio-inspired ad hoc routing protocols
Bio-inspired ad hoc routing is an active area of research. The designers of these algorithms predominantly evaluate the performance of their protocols with the help of simulation ...
Muhammad Saleem, Syed Ali Khayam, Muddassar Farooq