Sciweavers

1408 search results - page 194 / 282
» Dealing with Node Mobility in Ad Hoc Wireless Network
Sort
View
TWC
2011
291views more  TWC 2011»
14 years 4 months ago
On Optimal Cooperator Selection Policies for Multi-Hop Ad Hoc Networks
Abstract—In this paper we consider wireless cooperative multihop networks, where nodes that have decoded the message at the previous hop cooperate in the transmission toward the ...
Michele Rossi, Cristiano Tapparello, Stefano Tomas...
MDM
2009
Springer
126views Communications» more  MDM 2009»
15 years 4 months ago
Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory
Mobile Ad-hoc NETworks (MANETs) are known to be vulnerable to a variety of attacks due to lack of central authority or fixed network infrastructure. Many security schemes have bee...
Wenjia Li, Anupam Joshi
88
Voted
ICCCN
2008
IEEE
15 years 4 months ago
A Trust Model Robust to Slander Attacks in Ad Hoc Networks
— Slander attacks represent a significant danger to distributed reputation systems. Malicious nodes may collude to lie about the reputation of a particular neighbor and cause se...
Pedro B. Velloso, Rafael P. Laufer, Otto Carlos Mu...
WIOPT
2006
IEEE
15 years 3 months ago
Ad Hoc networks with topology-transparent scheduling schemes: Scaling laws and capacity/delay tradeoffs
— In this paper we investigate the limiting properties, in terms of capacity and delay, of an ad hoc network employing a topology-transparent scheduling scheme. In particular, we...
Daniele Miorandi, Hwee Pink Tan, Michele Zorzi
ADHOCNOW
2006
Springer
15 years 3 months ago
Threats to Security in DSRC/WAVE
Dedicated Short Range Communications (DSRC) enabled road vehicles are on the brink of actualizing an important application of mobile ad hoc networks. It is crucial that the message...
Christine Laurendeau, Michel Barbeau