Sciweavers

459 search results - page 69 / 92
» A Reputation-Based Trust Mechanism for Ad Hoc Networks
Sort
View
ICCCN
2008
IEEE
15 years 4 months ago
Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols
—Most existing wireless ad hoc routing protocols rely upon the use of backward learning technique with explicit control messages to route packets. In this paper we propose a set ...
Navodaya Garepalli, Kartik Gopalan, Ping Yang
WCE
2007
14 years 11 months ago
QoS-aware Multicast Ad hoc On-Demand Distance Vector Routing
—Ad hoc networking will become a major technology for wireless connectivity beside the multimedia necessity within the next few years. There are too many applications where one-t...
Vida Lashkari B. O., Mehdi Dehghan
CISIS
2009
IEEE
15 years 4 months ago
A Security Layer for JXTA Core Protocols
— JXTA defines a set of six core protocols specifically suited for ad hoc, pervasive, multi-hop, peer-to-peer (P2P) computing. These protocols allow peers to cooperate and form...
Joan Arnedo-Moreno, Jordi Herrera-Joancomart&iacut...
JTAER
2010
147views more  JTAER 2010»
14 years 8 months ago
Privacy Issues for Online Personal Photograph Collections
Technological developments now allow community groups, clubs, and even ordinary individuals to create their own, publicly accessible online digital multi-media collections. Howeve...
Sally Jo Cunningham, Masood Masoodian, Anne Adams
GLOBECOM
2008
IEEE
15 years 4 months ago
A Secure VANET MAC Protocol for DSRC Applications
— Vehicular ad hoc networking is an important component of Intelligent Transportation Systems. The main benefit of vehicular ad hoc network (VANET) communication is seen in activ...
Yi Qian, Kejie Lu, Nader Moayeri