Sciweavers

1677 search results - page 189 / 336
» A distributed security scheme for ad hoc networks
Sort
View
ICC
2008
IEEE
120views Communications» more  ICC 2008»
15 years 4 months ago
Invariance Property of Isotropic Random Walk Mobility Patterns in Mobile Ad-Hoc Networks
—The class of isotropic random walk mobility models, including Random Direction mobility model, Random Walk mobility model and Brownian motion mobility model, has been widely use...
Han Cai, Chul-Ho Lee, Do Young Eun
96
Voted
EUROPAR
2007
Springer
15 years 4 months ago
On the Connectivity of Bluetooth-Based Ad Hoc Networks
We study the connectivity properties of a family of random graphs which closely model the Bluetooth’s device discovery process, where each device tries to connect to other device...
Pilu Crescenzi, Carlo Nocentini, Andrea Pietracapr...
ICC
2007
IEEE
128views Communications» more  ICC 2007»
15 years 2 months ago
A Near Optimal Localized Heuristic for Voice Multicasting over Ad Hoc Wireless Networks
Abstract-- Providing real-time voice multicasting over multihop ad hoc wireless networks is a challenging task. The unique characteristics of voice traffic (viz. small packet size,...
G. Venkat Raju, Tamma Bheemarjuna Reddy, C. Siva R...
JSAC
2006
128views more  JSAC 2006»
14 years 10 months ago
A framework for misuse detection in ad hoc networks- part II
We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically stop functioning due to operational failu...
D. Subhadrabandhu, S. Sarkar, F. Anjum
TWC
2011
367views more  TWC 2011»
14 years 5 months ago
Improving the Performance of Wireless Ad Hoc Networks Through MAC Layer Design
—In this paper, the performance of the ALOHA and CSMA MAC protocols are analyzed in spatially distributed wireless networks. The main system objective is correct reception of pac...
Mariam Kaynia, Nihar Jindal, Geir E. Øien