Sciweavers

821 search results - page 86 / 165
» Mobile Distributed Information Retrieval for Highly-Partitio...
Sort
View
ICDCSW
2007
IEEE
15 years 4 months ago
A Cooperative Approach for Analyzing Intrusions in Mobile Ad hoc Networks
In this paper, we consider the problem of reducing the number of false positives generated by cooperative Intrusion Detection Systems (IDSs) in Mobile Ad hoc Networks (MANETs). We...
Hadi Otrok, Mourad Debbabi, Chadi Assi, Prabir Bha...
IADIS
2004
14 years 11 months ago
Jill (Just-in-Location Learning)
Wireless technologies are poised to bring major changes in the information infrastructure, transforming communications and facilitating information retrieval. Over the next severa...
Joaquin Ruiz, Susan Wheeler
INFOCOM
2011
IEEE
14 years 1 months ago
Fast and scalable secret key generation exploiting channel phase randomness in wireless networks
—Recently, there has been great interest in physical layer security techniques that exploit the randomness of wireless channels for securely extracting cryptographic keys. Severa...
Qian Wang, Hai Su, Kui Ren, Kwangjo Kim
ISCC
2005
IEEE
162views Communications» more  ISCC 2005»
15 years 3 months ago
A JXTA Compliant Framework for Mobile Handheld Devices in Ad Hoc Networks
The availability of powerful personal computers and high bandwidth home connectivity is changing the way users cooperate and exchange information on the network. Peer to peer comp...
Mario Bisignano, Giuseppe Di Modica, Orazio Tomarc...
MOBIHOC
2009
ACM
15 years 10 months ago
3DLS: density-driven data location service for mobile ad-hoc networks
Finding data items is one of the most basic services of any distributed system. It is particular challenging in ad-hoc networks, due to their inherent decentralized nature and lac...
Roy Friedman, Noam Mori