Sciweavers

1677 search results - page 71 / 336
» A distributed security scheme for ad hoc networks
Sort
View
ICPPW
2003
IEEE
15 years 5 months ago
Trusting Routers and Relays in Ad hoc Networks
The current generation of ad hoc networks relies on other nodes in the network for routing information and for routing the packets. These networks are based on the fundamental ass...
Prashant Dewan, Partha Dasgupta
MOBIHOC
2002
ACM
15 years 11 months ago
Priority scheduling in wireless ad hoc networks
Ad hoc networks formed without the aid of any established infrastructure are typically multi-hop networks. Location dependent contention and "hidden terminal" problem ma...
Xue Yang, Nitin H. Vaidya
HICSS
2003
IEEE
211views Biometrics» more  HICSS 2003»
15 years 5 months ago
Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks
In this paper we propose a distributed intrusion detection system for ad hoc wireless networks based on mobile agent technology. Wireless networks are particularly vulnerable to i...
Oleg Kachirski, Ratan K. Guha
ADHOC
2006
124views more  ADHOC 2006»
14 years 12 months ago
Mobility-capacity-delay trade-off in wireless ad hoc networks
We show that there is a trade-off among mobility, capacity, and delay in ad hoc networks. More specifically, we consider two schemes for node mobility in ad hoc networks. We divid...
Renato M. de Moraes, Hamid R. Sadjadpour, J. J. Ga...
ADHOC
2004
113views more  ADHOC 2004»
14 years 11 months ago
Distributed protocols for ad hoc wireless LANs: a learning-automata-based approach
An ad hoc learning-automata-based protocol for wireless LANs, capable of operating efficiently under bursty traffic conditions, is introduced. According to the proposed protocol, ...
Petros Nicopolitidis, Georgios I. Papadimitriou, A...