Sciweavers

1677 search results - page 236 / 336
» A distributed security scheme for ad hoc networks
Sort
View
NDSS
2006
IEEE
15 years 4 months ago
Toward a Practical Data Privacy Scheme for a Distributed Implementation of the Smith-Waterman Genome Sequence Comparison Algorit
Volunteer distributed computations utilize spare processor cycles of personal computers that are connected to the Internet. The resulting platforms provide computational power pre...
Doug Szajda, Michael Pohl, Jason Owen, Barry G. La...
TWC
2010
14 years 4 months ago
Channel Diversity in Random Wireless Networks
The goal of this paper is to explore the benefits of channel diversity in wireless ad hoc networks. Our model is that of a Poisson point process of transmitters, each with a recei...
Kostas Stamatiou, John G. Proakis, James R. Zeidle...
NOMS
2008
IEEE
15 years 4 months ago
Self-tuning network support for MANETs
Abstract—Rapid and unpredictable topology changes and resource constraints make delivering packets in a MANET (Mobile Ad hoc Network) a challenging task. Routing information has ...
Yangcheng Huang, Saleem N. Bhatti, Søren-Ak...
MOBIQUITOUS
2005
IEEE
15 years 3 months ago
SWAT: Small World-based Attacker Traceback in Ad-hoc Networks
Mobile Ad hoc NETworks (MANETs) provide a lot of promise for many practical applications. However, MANETs are vulnerable to a number of attacks due to its autonomous nature. DoS/D...
Yongjin Kim, Ahmed Helmy
TCOM
2008
120views more  TCOM 2008»
14 years 10 months ago
Network Coding for Efficient Multicast Routing in Wireless Ad-hoc Networks
Network coding is a powerful coding technique that has been proved to be very effective in achieving the maximum multicast capacity. It is especially suited for new emerging networ...
Jingyao Zhang, Pingyi Fan, Khaled Ben Letaief