Sciweavers

1677 search results - page 207 / 336
» A distributed security scheme for ad hoc networks
Sort
View
INFOCOM
2011
IEEE
14 years 1 months ago
Converge-cast with MIMO
—This paper investigates throughput and delay based on a newly predominant traffic pattern, called converge-cast, where each of the n nodes in the network act as a destination w...
Luoyi Fu, Yi Qin, Xinbing Wang, Xue Liu
NIPS
2003
14 years 11 months ago
Distributed Optimization in Adaptive Networks
We develop a protocol for optimizing dynamic behavior of a network of simple electronic components, such as a sensor network, an ad hoc network of mobile devices, or a network of ...
Ciamac Cyrus Moallemi, Benjamin Van Roy
65
Voted
SUTC
2006
IEEE
15 years 4 months ago
Implementation of Security Mechanism for Adhoc Wireless Networks Based on X.509 and IEEE 802.1X
To the best of our knowledge, there are only few security schemes for Adhoc networks [1]. In this study, we work on a practical security mechanism for Adhoc networks. To balance b...
Chia Hsing Tung, Yi Quan Chen, Zhi Mou Chen, Shuoh...
101
Voted
JUCS
2006
117views more  JUCS 2006»
14 years 10 months ago
Resource Efficient Maintenance of Wireless Network Topologies
Abstract: Multiple hop routing in mobile ad hoc networks can minimize energy consumption and increase data throughput. Yet, the problem of radio interferences remain. However if th...
Tamás Lukovszki, Christian Schindelhauer, K...
ICIP
2003
IEEE
15 years 11 months ago
Dither-based secure image hashing using distributed coding
We propose an image hashing algorithm that is based on distributed compression principles. The algorithm assumes the availability of a robust feature vector extracted from the ima...
Mark Johnson, Kannan Ramchandran