— Several intrusion detection approaches have been proposed for mobile adhoc networks. Many of the approaches assume that there are sufficient neighbors to help monitor the trans...
This contribution details how conceptual characterizations of route knowledge can provide the basis for graphical route information in a cognitively adequate way. The approach is b...
Alexander Klippel, Kai-Florian Richter, Stefan Han...
Energy is the most critical resource in the life of a wireless sensor node. Therefore, its usage must be optimized to maximize the network life. It is known that for higher path l...
Reputation mechanisms for detecting and punishing free-riders in ad hoc networks depend on the local detection of selfish behavior. Although naive selfish strategies based on drop...
Bo Wang 0001, Sohraab Soltani, Jonathan K. Shapiro...
—The selection of a path in a network from one node to another is performed by a routing protocol, often using the shortest path approach. However, it has been shown that in wire...
Winston Khoon Guan Seah, Alvin C. Valera, Pius W. ...