Sciweavers

370 search results - page 23 / 74
» An Approach to Ad hoc Cloud Computing
Sort
View
72
Voted
ICCNMC
2005
Springer
15 years 3 months ago
Minimum Disc Cover Set Construction in Mobile Ad Hoc Networks
— The minimum disc cover set can be used to construct the dominating set on the fly for energy-efficient communications in mobile ad hoc networks. The approach used to compute ...
Min-Te Sun, Xiaoli Ma, Chih-Wei Yi, Chuan-Kai Yang...
RAID
2004
Springer
15 years 3 months ago
Attack Analysis and Detection for Ad Hoc Routing Protocols
Abstract. Attack analysis is a challenging problem, especially in emerging environments where there are few known attack cases. One such new environment is the Mobile Ad hoc Networ...
Yi-an Huang, Wenke Lee
IWCMC
2006
ACM
15 years 3 months ago
System approach to intrusion detection using hidden Markov model
In an era of cooperating ad hoc networks and pervasive wireless connectivity, we are becoming more vulnerable to malicious attacks. Many of these attacks are silent in nature and ...
Rahul Khanna, Huaping Liu
CATA
2003
14 years 11 months ago
Efficient Power-aware Hybrid Routing using Zoning for Ad Hoc Network
A number of routing protocols have been proposed for mobile ad hoc networks. In this paper we propose a hybrid multiple zoning scheme minimizing the number of route request messag...
Jong Ho Lee, Hee Yong Youn, Chansu Yu, Dongman Lee
ISCC
2005
IEEE
104views Communications» more  ISCC 2005»
15 years 3 months ago
Bandwidth Guaranteed Routing for Ad Hoc Networks with Interference Consideration
The problem of computing bandwidth guaranteed paths for given flow requests in an ad-hoc network is complicated because neighboring links share the medium. We define the path wi...
Zhanfeng Jia, Rajarshi Gupta, Jean C. Walrand, Pra...