Sciweavers

1031 search results - page 33 / 207
» Adding Context to Preferences
Sort
View
ICC
2007
IEEE
101views Communications» more  ICC 2007»
15 years 8 months ago
Predicting the Performance of Mobile Ad Hoc Networks Using Scaled-Down Replicas
—Experimentation with mobile ad hoc network testbeds is preferred to simulations for performing high fidelity testing. But, at the same time, realistic experimentation with larg...
Fragkiskos Papadopoulos, Konstantinos Psounis
TWC
2008
176views more  TWC 2008»
15 years 1 months ago
Asynchronous distributed power and rate control in ad hoc networks: a game-theoretic approach
This paper analyzes distributed asynchronous power and rate control for wireless ad hoc networks. Importantly, all network transmitters are considered to be independent of any mana...
Stepán Kucera, Sonia Aïssa, Koji Yamam...
ADHOC
2007
134views more  ADHOC 2007»
15 years 1 months ago
Threshold password authentication against guessing attacks in Ad hoc networks
Password authentication has been accepted as one of the commonly used solutions in network environment to protect resources from unauthorized access. The emerging mobile Ad hoc ne...
Zhenchuan Chai, Zhenfu Cao, Rongxing Lu
ICC
2009
IEEE
136views Communications» more  ICC 2009»
15 years 8 months ago
Fast Connected Dominating Set Construction in Mobile Ad Hoc Networks
—The connected dominating set (CDS) has been commonly used for routing and broadcast in mobile ad hoc networks (MANETs). Considering the applications of MANETs, it is generally p...
Kazuya Sakai, Min-Te Sun, Wei-Shinn Ku
ADHOC
2008
132views more  ADHOC 2008»
15 years 2 months ago
Defending against cache consistency attacks in wireless ad hoc networks
Caching techniques can be used to reduce bandwidth consumption and data access delay in wireless ad hoc networks. When cache is used, the issue of cache consistency must be addres...
Wensheng Zhang, Guohong Cao