Sciweavers

236 search results - page 5 / 48
» adhoc 2005
Sort
View
ADHOC
2005
134views more  ADHOC 2005»
13 years 7 months ago
How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols
This paper presents a systematic analysis of insider attacks against mobile ad-hoc routing protocols, using the Ad hoc On-Demand Distance Vector (AODV) protocol as an example. It ...
Peng Ning, Kun Sun
ISCC
2005
IEEE
104views Communications» more  ISCC 2005»
14 years 1 months ago
Bandwidth Guaranteed Routing for Ad Hoc Networks with Interference Consideration
The problem of computing bandwidth guaranteed paths for given flow requests in an ad-hoc network is complicated because neighboring links share the medium. We define the path wi...
Zhanfeng Jia, Rajarshi Gupta, Jean C. Walrand, Pra...
CLEF
2005
Springer
14 years 29 days ago
Applying Light Natural Language Processing to Ad-Hoc Cross Language Information Retrieval
In the CLEF 2005 Ad-Hoc Track we experimented with language-specific morphosyntactic processing and light Natural Language Processing (NLP) for the retrieval of Bulgarian, French,...
Christina Lioma, Craig Macdonald, Ben He, Vassilis...
ADHOCNOW
2005
Springer
14 years 29 days ago
Equilibria for Broadcast Range Assignment Games in Ad-Hoc Networks
Pilu Crescenzi, Miriam Di Ianni, Alessandro Lazzon...