Sciweavers

1469 search results - page 155 / 294
» Cooperation in Wireless Ad Hoc Networks
Sort
View
95
Voted
SASN
2003
ACM
15 years 3 months ago
Modeling vulnerabilities of ad hoc routing protocols
The purpose of this work is to automate the analysis of ad hoc routing protocols in the presence of attackers. To this end, a formal model of protocol behavior is developed in whi...
Shahan Yang, John S. Baras
ESAS
2004
Springer
15 years 1 months ago
Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks
Abstract. The fact that security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. One of the different kinds of misbehavior a node ma...
Frank Kargl, Andreas Klenk, Stefan Schlott, Michae...
MWCN
2004
Springer
15 years 3 months ago
On Selecting Nodes to Improve Estimated Positions
— We consider node localization problems in ad hoc wireless networks in which two types of nodes are considered: nodes with self-locating capability like GPS and nodes with no se...
Erwan Ermel, Anne Fladenmuller, Guy Pujolle, Andr&...
IFIP
2004
Springer
15 years 3 months ago
Activity-Based User Modeling in Service-Oriented Ad-Hoc-Networks
Wireless network research still lacks methods to integratively evaluate the performance that can be expected from application layer protocols. The user behavior is predominantly aï...
Tobias Breyer, Michael Klein, Philipp Obreiter, Bi...
84
Voted
UIC
2007
Springer
15 years 4 months ago
Gateway Zone Multi-path Routing in Wireless Mesh Networks
Internet and multimedia services are widely-provided in All-IP based networks. There has been growing demand for mobile users to get those services. The Wireless Mesh Network (WMN...
Eric Hsiao-Kuang Wu, Wei-Li Chang, Chun-Wei Chen, ...