Sciweavers

1247 search results - page 165 / 250
» Designing Secure Wireless Mobile Ad Hoc Networks
Sort
View
JSAC
2006
181views more  JSAC 2006»
14 years 10 months ago
Information theoretic framework of trust modeling and evaluation for ad hoc networks
Abstract-- The performance of ad hoc networks depends on cooperation and trust among distributed nodes. To enhance security in ad hoc networks, it is important to evaluate trustwor...
Yan Lindsay Sun, Wei Yu, Zhu Han, K. J. Ray Liu
TON
2008
109views more  TON 2008»
14 years 9 months ago
Efficient routing in intermittently connected mobile networks: the single-copy case
Abstract--Intermittently connected mobile networks are wireless networks where most of the time there does not exist a complete path from the source to the destination. There are m...
Thrasyvoulos Spyropoulos, Konstantinos Psounis, Ca...
PE
2007
Springer
112views Optimization» more  PE 2007»
14 years 9 months ago
Design and analysis of adaptive strategies for locating internet-based servers in MANETs
A critical problem in providing Internet access to Mobile Ad Hoc Networks (MANETs) is how the mobile hosts can locate Internet-based servers efficiently in a dynamic, unstructure...
Hongbo Jiang, Shudong Jin
MOBIDE
2005
ACM
15 years 3 months ago
Tolerance of localization imprecision in efficiently managing mobile sensor databases
Query processing on mobile sensor networks requires efficient indexing and partitioning of the data space to support efficient routing as the network scales up. Building an index ...
Lin Xiao, Aris M. Ouksel
ICUMT
2009
14 years 7 months ago
A theoretical model for opportunistic routing in ad hoc networks
Traditional routing strategies for multi-hop wireless networks forward packets by selecting at the sender side the next hop for each packet. Recently, such a paradigm has been call...
Angela Sara Cacciapuoti, Marcello Caleffi, Luigi P...