Sciweavers

571 search results - page 59 / 115
» Improving the Usable Capacity of Ad Hoc Networks
Sort
View
VTC
2007
IEEE
15 years 5 months ago
Performance Evaluation of A Multiuser Detection Based MAC Design for Ad Hoc Networks
Abstract— In general, the performance and radio resource utilization of Ad Hoc networks are limited by half-duplex operation and possible collisions. In this paper, we propose a ...
Jinfang Zhang, Zbigniew Dziong, François Ga...
COORDINATION
2006
Springer
15 years 2 months ago
Using Lime to Support Replication for Availability in Mobile Ad Hoc Networks
Mobile ad hoc networks (MANETs) define a challenging computing scenario where access to resources is restrained by connectivity among hosts. Replication offers an opportunity to in...
Amy L. Murphy, Gian Pietro Picco
131
Voted
JDCTA
2010
150views more  JDCTA 2010»
14 years 6 months ago
Provable Password-Authenticated Key Exchange Protocol against Imposter Attack on Ad Hoc Networks
In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encrypted Key Exchange (EKE) protocol against offline dictionary attacks using both ...
Ang Gao
ISCIS
2005
Springer
15 years 4 months ago
Admission Control for Multicast Routing with Quality of Service in Ad Hoc Networks
Ad hoc networks, being able to organize themselves without user intervention, can easily provide their users with mobility, multimedia support and group communication. However, the...
Kaan Bür, Cem Ersoy
ICON
2007
IEEE
15 years 5 months ago
Node Localisation in Wireless Ad Hoc Networks
— Wireless ad hoc networks often require a method for estimating their nodes’ locations. Typically this is achieved by the use of pair-wise measurements between nodes and their...
Jon Arnold, Nigel Bean, Miro Kraetzl, Matthew Roug...