Sciweavers

1677 search results - page 190 / 336
» A distributed security scheme for ad hoc networks
Sort
View
94
Voted
MOBIHOC
2003
ACM
15 years 10 months ago
On the capacity improvement of ad hoc wireless networks using directional antennas
The capacity of ad hoc wireless networks is constrained by the interference between concurrent transmissions from neighboring nodes. Gupta and Kumar have shown that the capacity o...
Su Yi, Yong Pei, Shivkumar Kalyanaraman
SASN
2006
ACM
15 years 4 months ago
Impact of optimal MAC layer attacks on the network layer
Node misbehavior in wireless ad hoc networks leads to sudden unpredictable changes in network topology, resulting in fluctuation of traffic load and capacity for already existin...
Svetlana Radosavac, John S. Baras, George V. Moust...
99
Voted
GLOBECOM
2007
IEEE
15 years 4 months ago
Colouring Link-Directional Interference Graphs in Wireless Ad Hoc Networks
—In this paper, we clarify inter-link interference in wireless ad-hoc networks by using link-directional interference graphs (l-graph). Most of the interference graphs in the lit...
Ping Chung Ng, David J. Edwards, Soung Chang Liew
MOBIHOC
2006
ACM
15 years 10 months ago
MLS: : an efficient location service for mobile ad hoc networks
MLS is a distributed location service to track the position of mobile nodes and to route messages between any two nodes. The lookup of nodes is achieved by searching in a hierarch...
Roland Flury, Roger Wattenhofer
113
Voted
KES
2004
Springer
15 years 3 months ago
Supporting Smart Applications in Multihop Ad-Hoc Networks - The GecGo Middleware
The goal of the GecGo middleware is to provide all the services required by self-organizing distributed applications running on multihop ad-hoc networks. Because of the frequent as...
Peter Sturm, Hannes Frey, Daniel Görgen, Joha...