Sciweavers

2092 search results - page 212 / 419
» A Theory of Non-Deterministic Networks
Sort
View
93
Voted
CORR
2010
Springer
60views Education» more  CORR 2010»
15 years 18 days ago
A Novel Scheme for Secured Data Transfer Over Computer Networks
: This paper presents a novel encryption-less algorithm to enhance security in transmission of data in networks. The algorithm uses an intuitively simple idea of a `jigsaw puzzle&#...
Rangarajan Vasudevan, Ajith Abraham, Sugata Sanyal
CORR
2008
Springer
187views Education» more  CORR 2008»
15 years 17 days ago
Coalitions in Cooperative Wireless Networks
Cooperation between rational users in wireless networks is studied using coalitional game theory. Using the rate achieved by a user as its utility, it is shown that the stable coal...
Suhas Mathur, Lalitha Sankar, Narayan B. Mandayam
113
Voted
CORR
2008
Springer
107views Education» more  CORR 2008»
15 years 17 days ago
Modeling Spatial and Temporal Dependencies of User Mobility in Wireless Mobile Networks
Abstract--Realistic mobility models are fundamental to evaluate the performance of protocols in mobile ad hoc networks. Unfortunately, there are no mobility models that capture the...
Wei-jen Hsu, Thrasyvoulos Spyropoulos, Konstantino...
IJLT
2008
184views more  IJLT 2008»
15 years 15 days ago
Ad hoc transient communities: towards fostering knowledge sharing in learning networks
: To enhance users' social embedding within learning networks, we propose to establish ad hoc transient communities. These communities serve a particular goal, exist for a lim...
Adriana J. Berlanga, Peter B. Sloep, Liesbeth Kest...
105
Voted
JSAC
2006
128views more  JSAC 2006»
15 years 13 days ago
A framework for misuse detection in ad hoc networks- part II
We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically stop functioning due to operational failu...
D. Subhadrabandhu, S. Sarkar, F. Anjum