Sciweavers

1247 search results - page 149 / 250
» Designing Secure Wireless Mobile Ad Hoc Networks
Sort
View
SASN
2003
ACM
15 years 3 months ago
Modeling vulnerabilities of ad hoc routing protocols
The purpose of this work is to automate the analysis of ad hoc routing protocols in the presence of attackers. To this end, a formal model of protocol behavior is developed in whi...
Shahan Yang, John S. Baras
TMC
2008
125views more  TMC 2008»
14 years 10 months ago
Distributed Algorithm for Efficient Construction and Maintenance of Connected k-Hop Dominating Sets in Mobile Ad Hoc Networks
A k-hop dominating set is a subset of nodes such that each node not in the set can be reached within k hops from at least one node in the set. A connected k-hop dominating set can ...
Hong-Yen Yang, Chia-Hung Lin, Ming-Jer Tsai
ICSE
2001
IEEE-ACM
15 years 2 months ago
Consistent Group Membership in Ad Hoc Networks
The design of ad hoc mobile applications often requires the availability of a consistent view of the application state among the participating hosts. Such views are important beca...
Gruia-Catalin Roman, Qingfeng Huang, Ali Hazemi
ICDCS
2010
IEEE
15 years 3 hour ago
Distributed Coverage in Wireless Ad Hoc and Sensor Networks by Topological Graph Approaches
Abstract—Coverage problem is a fundamental issue in wireless ad hoc and sensor networks. Previous techniques for coverage scheduling often require accurate location information o...
Dezun Dong, Yunhao Liu, Kebin Liu, Xiangke Liao
INFOCOM
2003
IEEE
15 years 3 months ago
Cooperation in Wireless Ad Hoc Networks
— In wireless ad hoc networks, nodes communicate with far off destinations using intermediate nodes as relays. Since wireless nodes are energy constrained, it may not be in the b...
Vikram Srinivasan, Pavan Nuggehalli, Carla-Fabiana...