Sciweavers

ADHOCNOW
2008
Springer
14 years 6 months ago
Distributed Monitoring in Ad Hoc Networks: Conformance and Security Checking
Ad hoc networks are exposed more than traditional networks to security threats due to their mobility and open architecture aspects. In addition, any dysfunction due to badly congu...
Wissam Mallouli, Bachar Wehbi, Ana R. Cavalli
WCNC
2008
IEEE
14 years 6 months ago
On Reducing Broadcast Transmission Cost and Redundancy in Ad Hoc Wireless Networks Using Directional Antennas
—Using directional antennas to conserve bandwidth and energy consumption in ad hoc wireless networks has attracted much attention of the research community in recent years. Howev...
Ling Ding, Yifeng Shao, Minglu Li
SEFM
2008
IEEE
14 years 6 months ago
Restricted Broadcast Process Theory
We present a process algebra for modeling and reasoning about Mobile Ad hoc Networks (MANETs) and their protocols. In our algebra we model the essential modeling concepts of ad ho...
Fatemeh Ghassemi, Wan Fokkink, Ali Movaghar
PIMRC
2008
IEEE
14 years 6 months ago
Effects of topology on local throughput-capacity of ad hoc networks
—Most publications on the capacity and performance of wireless ad hoc networks share the underlying assumption of a uniform random distribution of nodes. In this paper, we study ...
Jakob Hoydis, Marina Petrova, Petri Mähö...
MUE
2008
IEEE
218views Multimedia» more  MUE 2008»
14 years 6 months ago
I-SEAD: A Secure Routing Protocol for Mobile Ad Hoc Networks
Ad hoc networks are highly dynamic routing networks cooperated by a collection of wireless mobile hosts without any assistance of centralized access point. Secure Efficient Ad hoc...
Chu-Hsing Lin, Wei-Shen Lai, Yen-Lin Huang, Mei-Ch...
ICC
2008
IEEE
130views Communications» more  ICC 2008»
14 years 6 months ago
A Polynomial-Time Approximation Algorithm for Weighted Sum-Rate Maximization in UWB Networks
— Scheduling in an ad hoc wireless network suffers from the non-convexity of the cost function, caused by the interference between communication links. In previous optimization t...
Gyouhwan Kim, Qiao Li, Rohit Negi
AINA
2008
IEEE
14 years 6 months ago
A Proposed Scheme for Epidemic Routing with Active Curing for Opportunistic Networks
Opportunistic networking is emerging as a technique to exploit chance encounters among mobile nodes, and is distinct from previously studied behaviors found in sensor and ad hoc n...
Jonah P. Tower, Thomas D. C. Little
SIGCOMM
2009
ACM
14 years 6 months ago
MobiClique: middleware for mobile social networking
We consider a mobile ad hoc network setting where Bluetooth enabled mobile devices communicate directly with other devices as they meet opportunistically. We design and implement ...
Anna Kaisa Pietiläinen, Earl Oliver, Jason Le...
IWCMC
2009
ACM
14 years 6 months ago
Dynamic trust establishment in emergency ad hoc networks
This paper proposes a dynamic trust establishment protocol that enables the nodes of an ad hoc network to establish security associations among each other in a distributed and pee...
Christos A. Papageorgiou, Konstantinos Birkos, Tas...
ESEM
2009
ACM
14 years 6 months ago
Optimized assignment of developers for fixing bugs an initial evaluation for eclipse projects
Decisions on “Who should fix this bug” have substantial impact on the duration of the process and its results. In this paper, optimized strategies for the assignment of the ...
Md. Mainur Rahman, Günther Ruhe, Thomas Zimme...