Sciweavers

29 search results - page 3 / 6
» Enforcing Data Integrity in Very Large Ad Hoc Networks
Sort
View
ISMIS
2005
Springer
13 years 10 months ago
Towards Ad-Hoc Rule Semantics for Gene Expression Data
The notion of rules is very popular and appears in different flavors, for example as association rules in data mining or as functional (or multivalued) dependencies in databases. ...
Marie Agier, Jean-Marc Petit, Einoshin Suzuki
IJNM
2008
112views more  IJNM 2008»
13 years 5 months ago
How to avoid packet droppers with proactive routing protocols for ad hoc networks
Routing protocols for mobile ad hoc networks (MANETs) have been an active area of research for the last decade, with many very interesting potential as well as actual applications...
Ignacy Gawedzki, Khaldoun Al Agha
TC
2010
13 years 3 months ago
Stateless Multicasting in Mobile Ad Hoc Networks
—There are increasing interest and big challenge in designing a scalable and robust multicast routing protocol in a mobile ad hoc network (MANET) due to the difficulty in group ...
Xiaojing Xiang, Xin Wang, Yuanyuan Yang
ICC
2007
IEEE
144views Communications» more  ICC 2007»
13 years 11 months ago
On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks
— Colluding malicious insider nodes with no special hardware capability can use packet encapsulation and tunnelling to create bogus short-cuts (in-band wormholes) in routing path...
Xu Su, Rajendra V. Boppana
TPDS
2010
199views more  TPDS 2010»
13 years 3 months ago
Flexible Cache Consistency Maintenance over Wireless Ad Hoc Networks
—One of the major applications of wireless ad hoc networks is to extend the Internet coverage and support pervasive and efficient data dissemination and sharing. To reduce data a...
Yu Huang 0002, Jiannong Cao, Beihong Jin, XianPing...