Sciweavers

1380 search results - page 217 / 276
» A guide to trust in mobile ad hoc networks
Sort
View
ECEASST
2008
83views more  ECEASST 2008»
14 years 12 months ago
Layered Architecture Consistency for MANETs: Introducing New Team Members
In this paper we extend our results (as given in [PHE+07]) concerning the layered architecture for modeling workflows in Mobile Ad-Hoc NETworks (MANETs) using algebraic higher ord...
Enrico Biermann, Kathrin Hoffmann, Julia Padberg
INFOCOM
2005
IEEE
15 years 5 months ago
Provably competitive adaptive routing
Abstract— An ad hoc wireless network is an autonomous selforganizing system of mobile nodes connected by wireless links where nodes not in direct range communicate via intermedia...
Baruch Awerbuch, David Holmer, Herbert Rubens, Rob...
MSWIM
2005
ACM
15 years 5 months ago
Experimental comparisons between SAODV and AODV routing protocols
There have been various secure routing protocols proposed for mobile ad hoc networks. Most of these protocols are analyzed by two standard techniques: simulation and security anal...
Yuxia Lin, Amir Hamed Mohsenian Rad, Vincent W. S....
AAAI
2010
14 years 11 months ago
A Trust Model for Supply Chain Management
hey generalize these factors to the abstract concepts of ability, integrity, and benevolence. This model does not use probabilistic decision theory. Other SCM trust factors have be...
Yasaman Haghpanah, Marie desJardins
ADHOC
2007
73views more  ADHOC 2007»
15 years 7 hour ago
A survey on real-world implementations of mobile ad-hoc networks
Simulation and emulation are valuable techniques for the evaluation of algorithms and protocols used in mobile ad-hoc networks. However, these techniques always require the simpli...
Wolfgang Kieß, Martin Mauve