Sciweavers

INFOCOM
2003
IEEE
14 years 4 months ago
Cooperation in Wireless Ad Hoc Networks
— In wireless ad hoc networks, nodes communicate with far off destinations using intermediate nodes as relays. Since wireless nodes are energy constrained, it may not be in the b...
Vikram Srinivasan, Pavan Nuggehalli, Carla-Fabiana...
INFOCOM
2003
IEEE
14 years 4 months ago
Route Driven Gossip: Probabilistic Reliable Multicast in Ad Hoc Networks
Abstract— Traditionally, reliable multicast protocols are deterministic in nature. It is precisely this determinism that tends to become their limiting factor when aiming at reli...
Jun Luo, Patrick Th. Eugster, Jean-Pierre Hubaux
ICPPW
2003
IEEE
14 years 4 months ago
Trusting Routers and Relays in Ad hoc Networks
The current generation of ad hoc networks relies on other nodes in the network for routing information and for routing the packets. These networks are based on the fundamental ass...
Prashant Dewan, Partha Dasgupta
ICNP
2003
IEEE
14 years 4 months ago
Delay Analysis of IEEE 802.11 in Single-Hop Networks
This paper presents an analytical model to compute the average service time and jitter experienced by a packet when transmitted in a saturated IEEE 802.11 ad hoc network. In contr...
Marcelo M. Carvalho, J. J. Garcia-Luna-Aceves
ICDCSW
2003
IEEE
14 years 4 months ago
LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks
Most ad hoc networks do not implement any network access control, leaving these networks vulnerable to resource consumption attacks where a malicious node injects packets into the...
Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jaj...
ICDCSW
2003
IEEE
14 years 4 months ago
MESH Mdl - A Middleware for Self-Organization in Ad Hoc Networks
— The maturing domain of ad hoc networking still holds some major challenges on its way to commercial exploitation. The dynamic and decentralized nature of ad hoc networks calls ...
Klaus Herrmann
ICDCSW
2003
IEEE
14 years 4 months ago
ContextCube - Providing Context Information Ubiquitously
Sensing the state of the environment is an important source for context-aware applications. Several approaches exist to provide sensor information to mobile application nodes. As ...
Martin Bauer, Christian Becker, Jörg Häh...
ICDCSW
2003
IEEE
14 years 4 months ago
Foundations of Security for Hash Chains in Ad Hoc Networks
Nodes in ad hoc networks generally transmit data at regular intervals over long periods of time. Recently, ad hoc network nodes have been built that run on little power and have v...
Phillip G. Bradford, Olga V. Gavrylyako
ICDCSW
2003
IEEE
14 years 4 months ago
IEEE 802.11 Ad Hoc Networks: Performance Measurements
 In this paper we investigate the performance of IEEE 802.11 ad hoc networks by means of an experimental study. Measurements on IEEE 802.11 ad hoc networks confirm previous sim...
Giuseppe Anastasi, Eleonora Borgia, Marco Conti, E...
HICSS
2003
IEEE
148views Biometrics» more  HICSS 2003»
14 years 4 months ago
Bluenet II - A Detailed Realization of the Algorithm and Performance
The recent interest in ad hoc networks, in general, and in the Bluetooth technology, in particular, has stimulated much research in algorithms for topology control of such network...
Zhifang Wang, Zygmunt J. Haas, Robert J. Thomas