Sciweavers

1558 search results - page 60 / 312
» Mobility helps security in ad hoc networks
Sort
View
IWCMC
2006
ACM
15 years 5 months ago
Analysis of mobile beacon aided in-range localization scheme in ad hoc wireless sensor networks
In this paper, We mathematically model the In-Range localization scheme in the presence of a Mobile Beacon. In the In-Range localization scheme, a sensor with unknown location is ...
T. V. Srinath, Anil Kumar Katti, V. S. Ananthanara...
CRITIS
2006
15 years 3 months ago
Trust Establishment in Ad Hoc and Sensor Networks
Ad hoc and sensor networks highly depend on the distributed cooperation among network nodes. Trust establishment frameworks provide the means for representing, evaluating, maintain...
Efthimia Aivaloglou, Stefanos Gritzalis, Charalabo...
ADHOC
2008
183views more  ADHOC 2008»
15 years 8 hour ago
On ant routing algorithms in ad hoc networks with critical connectivity
This paper shows a novel self-organizing approach for routing datagrams in ad hoc networks, called Distributed Ant Routing (DAR). This approach belongs to the class of routing alg...
Laura Rosati, Matteo Berioli, Gianluca Reali
104
Voted
TRIDENTCOM
2005
IEEE
15 years 5 months ago
A Testbed and Methodology for Experimental Evaluation of Wireless Mobile Ad hoc Networks
Wireless mobile ad hoc network experimentation is subjected to stochastic factors from the radio environment and node mobility. To achieve test repeatability and result reproducib...
Erik Nordström, Per Gunningberg, Henrik Lundg...
MUM
2006
ACM
181views Multimedia» more  MUM 2006»
15 years 5 months ago
Cross-layer design for providing service oriented architecture in a mobile Ad Hoc network
This paper presents a novel cross-layer design for providing service oriented architecture (SOA) in a mobile ad hoc network (MANET). In the design SOA service discovery is integra...
Tommi Halonen, Timo Ojala