Sciweavers

1083 search results - page 93 / 217
» Performance of Underwater Ad-Hoc Networks
Sort
View
JCO
2006
126views more  JCO 2006»
14 years 9 months ago
Minimum power assignment in wireless ad hoc networks with spanner property
Power assignment for wireless ad hoc networks is to assign a power for each wireless node such that the induced communication graph has some required properties. Recently research ...
Yu Wang 0003, Xiang-Yang Li
SENSYS
2003
ACM
15 years 3 months ago
Model-based compression in wireless ad hoc networks
We present a technique for compression of shortest paths routing tables for wireless ad hoc networks. The main characteristic of such networks is that geographic location of nodes...
Milenko Drinic, Darko Kirovski, Miodrag Potkonjak
ICC
2009
IEEE
151views Communications» more  ICC 2009»
15 years 4 months ago
A PHY-MAC Cross-Layer Protocol for Ad Hoc Networks with Multiple-Antenna Nodes
—In this paper, we propose a physical (PHY) - medium access control (MAC) cross-layer protocol for ad hoc networks with antenna-array-equipped nodes that employ single-antenna tr...
Ioannis Spyropoulos, James R. Zeidler
INFOCOM
2006
IEEE
15 years 3 months ago
A Statistical Framework for Intrusion Detection in Ad Hoc Networks
— We focus on detecting intrusions in ad hoc networks using the misuse detection technique. We allow for detection modules that periodically fail to detect attacks and also gener...
Dhanant Subhadrabandhu, Saswati Sarkar, Farooq Anj...
ACNS
2006
Springer
167views Cryptology» more  ACNS 2006»
15 years 1 months ago
Public Key Cryptography Sans Certificates in Ad Hoc Networks
Abstract. Several researchers have proposed the use of threshold cryptographic model to enable secure communication in ad hoc networks without the need of a trusted center. In this...
Nitesh Saxena