Sciweavers

1267 search results - page 65 / 254
» On the scalability of IEEE 802.11 ad hoc networks
Sort
View
AINA
2007
IEEE
15 years 7 months ago
A Context-Based Delegation Access Control Model for Pervasive Computing
This paper presents an architectural model for contextual-based delegation access control for pervasive computing, particularly access control mechanisms for ad hoc coalition scen...
Ramiro Liscano, Kaining Wang
INFOCOM
2003
IEEE
15 years 6 months ago
Random Waypoint Considered Harmful
— This study examines the random waypoint model widely used in the simulation studies of mobile ad hoc networks. Our findings show that this model fails to provide a steady stat...
Jungkeun Yoon, Mingyan Liu, Brian Noble
NCA
2005
IEEE
15 years 7 months ago
Location-based Publish/Subscribe
This paper introduces the concept of location-based publish/subscribe (LPS), which allows mobile ad hoc applications to anonymously communicate with each other, depending on their...
Patrick Th. Eugster, Benoît Garbinato, Adria...
IJNSEC
2006
205views more  IJNSEC 2006»
15 years 1 months ago
A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks
Nodes in a mobile ad hoc network need to thwart various attacks and malicious activities. This is especially true for the ad hoc environment where there is a total lack of central...
Animesh Patcha, Jung-Min Park
INFOCOM
2006
IEEE
15 years 7 months ago
A Brownian Motion Model for Last Encounter Routing
— We use a mathematical model based on Brownian motion to analyze the performance of Last Encounter Routing (LER), a routing protocol for ad hoc networks. Our results show that, ...
Stratis Ioannidis, Peter Marbach