Sciweavers

500 search results - page 100 / 100
» Preventive and Corrective Protection for Mobile Ad Hoc Netwo...
Sort
View
WMASH
2004
ACM
13 years 11 months ago
SOWER: self-organizing wireless network for messaging
Short Message Service (SMS) has become extremely popular in many countries, and represents a multibillion dollars market. Yet many consumers consider that the price cellular netwo...
Márk Félegyházi, Srdjan Capku...
WICOMM
2008
139views more  WICOMM 2008»
13 years 5 months ago
Struggling against selfishness and black hole attacks in MANETs
Since mobile ad hoc networks (MANETs) are infrastructureless and multi-hop by nature, transmitting packets from any node to another usually relies on services provided by intermed...
Djamel Djenouri, Nadjib Badache
ACNS
2011
Springer
241views Cryptology» more  ACNS 2011»
12 years 9 months ago
Misuse Detection in Consent-Based Networks
Consent-based networking, which requires senders to have permission to send traffic, can protect against multiple attacks on the network. Highly dynamic networks like Mobile Ad-hoc...
Mansoor Alicherry, Angelos D. Keromytis
ALGOSENSORS
2009
Springer
14 years 11 days ago
Link Reversal: How to Play Better to Work Less
Sensor networks, with their ad hoc deployments, node mobility, and wireless communication, pose serious challenges for developing provably correct and efficient applications. A po...
Bernadette Charron-Bost, Jennifer L. Welch, Josef ...
SPAA
2005
ACM
13 years 11 months ago
Constant density spanners for wireless ad-hoc networks
An important problem for wireless ad hoc networks has been to design overlay networks that allow time- and energy-efficient routing. Many local-control strategies for maintaining...
Kishore Kothapalli, Christian Scheideler, Melih On...