Sciweavers

425 search results - page 20 / 85
» adhoc 2007
Sort
View
COMPSAC
2007
IEEE
14 years 4 months ago
An End-to-end Detection of Wormhole Attack in Wireless Ad-hoc Networks
Wormhole attack is a severe attack in wireless ad-hoc networks. Most of the previous work eliminate the effect of wormhole attack by examining the distance or communication time o...
Xia Wang, Johnny Wong
IAJIT
2007
146views more  IAJIT 2007»
13 years 10 months ago
Adaptive Optimizing of Hello Messages in Wireless Ad-Hoc Networks
: Routing is an important functional aspect in wireless ad-hoc networks that handles discovering and maintaining the paths between nodes within a network. Due to nodes mobility, th...
Essam Natsheh, Adznan B. Jantan, Sabira Khatun, Su...
MOBISYS
2007
ACM
14 years 9 months ago
Participatory user centered design techniques for a large scale ad-hoc health information system
During mass casualty incidents, an enormous amount of data, including the vital signs of the patients, the location of the patients, and the location of the first responders must ...
Tia Gao, Tammara Massey, Majid Sarrafzadeh, Leo Se...
ENTCS
2007
131views more  ENTCS 2007»
13 years 10 months ago
Secure Node Discovery in Ad-hoc Networks and Applications
Designing secure protocols over ad-hoc networks has proved to be a very challenging task, due to various features of such networks, such as partial connectivity, node mobility, an...
Giovanni Di Crescenzo
DPD
2007
100views more  DPD 2007»
13 years 10 months ago
Managing real-time database transactions in mobile ad-hoc networks
In a mobile ad-hoc network (MANET), mobile hosts can move freely and communicate with each other directly through a wireless medium without the existence of a fixed wired infrastr...
Le Gruenwald, Shankar M. Banik, Chuo N. Lau