Sciweavers

2572 search results - page 37 / 515
» Identification in Ad Hoc Networks
Sort
View
ADHOCNOW
2008
Springer
15 years 8 months ago
Distributed Monitoring in Ad Hoc Networks: Conformance and Security Checking
Ad hoc networks are exposed more than traditional networks to security threats due to their mobility and open architecture aspects. In addition, any dysfunction due to badly congu...
Wissam Mallouli, Bachar Wehbi, Ana R. Cavalli
WOWMOM
2005
ACM
201views Multimedia» more  WOWMOM 2005»
15 years 7 months ago
Real-Time Intrusion Detection for Ad Hoc Networks
A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. The widely accepted existing routing protocols de...
Ioanna Stamouli, Patroklos G. Argyroudis, Hitesh T...
AINA
2010
IEEE
15 years 7 months ago
Gradient Based Routing Support for Cooperative Multi-channel MAC in Ad Hoc Wireless Networks
— Growing popularity of wireless ad hoc networks leads to higher demands on performance of all TCP/IP stack layers. Usually ad hoc networks operate according to IEEE 802.11 stand...
Stepan Ivanov, Dmitri Botvich, Sasitharan Balasubr...
MONET
2007
160views more  MONET 2007»
15 years 1 months ago
Joint Design of Routing and Medium Access Control for Hybrid Mobile Ad Hoc Networks
Efficient routing and medium access control (MAC) are very important for Mobile Ad hoc Networks (MANETs). Most existing routing and MAC protocols consider homogeneous ad hoc networ...
Xiaojiang Du, Dapeng Wu
ICPADS
2006
IEEE
15 years 8 months ago
Incentive Compatible Cost- and Stability-Based Routing in Ad Hoc Networks
In this paper, we embed an incentive-compatible, efficient, and individual rational payment scheme into our cost- and stability-based routing protocol in ad hoc networks which co...
Mingming Lu, Feng Li, Jie Wu