Sciweavers

313 search results - page 42 / 63
» Key agreement in ad hoc networks
Sort
View
WS
2006
ACM
15 years 3 months ago
Modeling Ad-hoc rushing attack in a negligibility-based security framework
In this paper, we propose a formal notion of network security for ad hoc networks. We adopt a probabilistic security framework, that is, security is defined by a polynomially bou...
Jiejun Kong, Xiaoyan Hong, Mario Gerla
CUZA
2002
129views more  CUZA 2002»
14 years 9 months ago
Ad Hoc Metacomputing with Compeer
Metacomputing allows the exploitation of geographically seperate, heterogenous networks and resources. Most metacomputers are feature rich and carry a long, complicated installati...
Keith Power, John P. Morrison
MWCN
2004
Springer
15 years 3 months ago
On Selecting Nodes to Improve Estimated Positions
— We consider node localization problems in ad hoc wireless networks in which two types of nodes are considered: nodes with self-locating capability like GPS and nodes with no se...
Erwan Ermel, Anne Fladenmuller, Guy Pujolle, Andr&...
78
Voted
ISMIS
2005
Springer
15 years 3 months ago
Towards Ad-Hoc Rule Semantics for Gene Expression Data
The notion of rules is very popular and appears in different flavors, for example as association rules in data mining or as functional (or multivalued) dependencies in databases. ...
Marie Agier, Jean-Marc Petit, Einoshin Suzuki
GLOBECOM
2008
IEEE
15 years 4 months ago
A Secure VANET MAC Protocol for DSRC Applications
— Vehicular ad hoc networking is an important component of Intelligent Transportation Systems. The main benefit of vehicular ad hoc network (VANET) communication is seen in activ...
Yi Qian, Kejie Lu, Nader Moayeri