Sciweavers

1464 search results - page 79 / 293
» Worst case mobility in ad hoc networks
Sort
View
ADHOC
2007
134views more  ADHOC 2007»
13 years 7 months ago
Threshold password authentication against guessing attacks in Ad hoc networks
Password authentication has been accepted as one of the commonly used solutions in network environment to protect resources from unauthorized access. The emerging mobile Ad hoc ne...
Zhenchuan Chai, Zhenfu Cao, Rongxing Lu
PEWASUN
2004
ACM
14 years 1 months ago
A framework of secure location service for position-based ad hoc routing
In large and dense mobile ad hoc networks, position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location i...
Joo-Han Song, Vincent W. S. Wong, Victor C. M. Leu...
WCNC
2008
IEEE
14 years 2 months ago
A Transcoding-Free Multiple Description Coder for Voice over Mobile Ad-Hoc Networks
— We propose a new multiple description (MD) coder design based on the Adaptive Multi-Rate Wideband (AMRWB) coder that can support transcoding-free communication between an ad-ho...
Jagadeesh Balam, Jerry D. Gibson
AINA
2008
IEEE
13 years 7 months ago
Updated Data Dissemination for Applications with Time Constraints in Mobile Ad Hoc Networks
In our previous work, we proposed few updated data dissemination methods to refresh old replicas efficiently in mobile ad hoc networks. These methods disseminate updated data item...
Takahiro Hara, Sanjay Kumar Madria
ATAL
2004
Springer
14 years 1 months ago
Stigmergic Learning for Self-Organizing Mobile Ad-Hoc Networks (MANET's)
In recent years, mobile ad-hoc networks (MANET’s) have been deployed in various scenarios, but their scalability is severely restricted by the human operators’ ability to conf...
H. Van Dyke Parunak, Sven Brueckner