Sciweavers

28 search results - page 3 / 6
» Memetic Networks: Analyzing the Effects of Network Propertie...
Sort
View
PERCOM
2010
ACM
13 years 3 months ago
Analysis of Quality of Surveillance in fusion-based sensor networks
—Recent years have witnessed the deployments of wireless sensor networks for mission-critical applications such as battlefield monitoring and security surveillance. These applic...
Rui Tan, Guoliang Xing, Xunteng Xu, Jianping Wang
ICNP
2009
IEEE
13 years 12 months ago
Topological Detection on Wormholes in Wireless Ad Hoc and Sensor Networks
—Wormhole attack is a severe threat to wireless ad hoc and sensor networks. Most existing countermeasures either require specialized hardware devices or make strong assumptions o...
Dezun Dong, Mo Li, Yunhao Liu, Xiang-Yang Li, Xian...
ITCC
2005
IEEE
13 years 11 months ago
A Lightweight Authentication Protocol for Mobile Ad Hoc Networks
The characteristics of mobile ad hoc networks (MANETs) determine that the authentication approaches to protect routing and data packet transmission in MANETs should be lightweight...
Bin Lu, Udo W. Pooch
TC
2008
13 years 5 months ago
The Convergence-Guaranteed Random Walk and Its Applications in Peer-to-Peer Networks
Network structure construction and global state maintenance are expensive in large-scale, dynamic peer-to-peer (p2p) networks. With inherent topology independence and low state mai...
Ming Zhong, Kai Shen, Joel I. Seiferas
MOBIHOC
2008
ACM
14 years 4 months ago
Toward stochastic anatomy of inter-meeting time distribution under general mobility models
Recent discovery of the mixture (power-law and exponential) behavior of inter-meeting time distribution of mobile nodes presents new challenge to the problem of mobility modeling ...
Han Cai, Do Young Eun