Sciweavers

601 search results - page 65 / 121
» On-demand Power Management for Ad Hoc Networks
Sort
View
CIIT
2007
195views Communications» more  CIIT 2007»
14 years 11 months ago
Using a cache scheme to detect selfish nodes in mobile ad hoc networks
This paper presents a hardware based cache scheme to detect selfish nodes in mobile ad hoc network. In this scheme, the hardware monitors the activities of the upperlayer software...
H. Lin, José G. Delgado-Frias, Sirisha Medi...
GI
2004
Springer
15 years 3 months ago
On the Use of Structured P2P Indexing Mechanisms in Mobile Ad-Hoc Scenarios
Abstract: Recently, Distributed Hash Tables evolved to a preferred approach for decentralized data management in widely distributed systems. Due to their crucial characteristics â€...
Tobias Heer, Heiko Niedermayer, Leo Petrak, Simon ...
ICC
2009
IEEE
151views Communications» more  ICC 2009»
15 years 4 months ago
A PHY-MAC Cross-Layer Protocol for Ad Hoc Networks with Multiple-Antenna Nodes
—In this paper, we propose a physical (PHY) - medium access control (MAC) cross-layer protocol for ad hoc networks with antenna-array-equipped nodes that employ single-antenna tr...
Ioannis Spyropoulos, James R. Zeidler
INFOCOM
2006
IEEE
15 years 3 months ago
A Statistical Framework for Intrusion Detection in Ad Hoc Networks
— We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically fail to detect attacks and also gener...
Dhanant Subhadrabandhu, Saswati Sarkar, Farooq Anj...
CORR
2008
Springer
100views Education» more  CORR 2008»
14 years 10 months ago
Spatial Interference Cancelation for Mobile Ad Hoc Networks: Perfect CSI
Abstract--Interference between nodes directly limits the capacity of mobile ad hoc networks. This paper focuses on spatial interference cancelation with perfect channel state infor...
Kaibin Huang, Jeffrey G. Andrews, Robert W. Heath ...