Sciweavers

1677 search results - page 43 / 336
» A distributed security scheme for ad hoc networks
Sort
View
EUROMICRO
2004
IEEE
15 years 3 months ago
Securing Ad hoc Routing Protocols
Ad hoc networks are subject of many recent research efforts. Especially in mobile scenarios, self-organizing networks are of high interest. While the routing aspects of mobile ad ...
Frank Kargl, Stefan Schlott, Andreas Klenk, Alfred...
JSAC
2006
107views more  JSAC 2006»
14 years 11 months ago
Distributed interference compensation for wireless networks
We consider a distributed power control scheme for wireless ad hoc networks, in which each user announces a price that reflects compensation paid by other users for their interfere...
Jianwei Huang, Randall A. Berry, Michael L. Honig
AINA
2007
IEEE
15 years 1 months ago
Secure Mobile Ad hoc Routing
In mobile ad hoc networks (MANETs), multi-hop message relay is the common way for nodes to communicate and participate in network operations, making routing a primary issue. The e...
Xu Li, Amiya Nayak, Isabelle Ryl, David Simplot, I...
75
Voted
PERCOM
2006
ACM
15 years 11 months ago
Adapting Distributed Hash Tables for Mobile Ad Hoc Networks
Tobias Heer, Stefan Götz, Simon Rieche, Klaus...
CORR
2007
Springer
126views Education» more  CORR 2007»
14 years 11 months ago
The effect of fading, channel inversion, and threshold scheduling on ad hoc networks
—This paper addresses three issues in the field of ad hoc network capacity: the impact of i) channel fading, ii) channel inversion power control, and iii) threshold–based sche...
Steven Weber, Jeffrey G. Andrews, Nihar Jindal