Sciweavers

443 search results - page 58 / 89
» Privacy Issues in Vehicular Ad Hoc Networks
Sort
View
ICPP
2005
IEEE
15 years 5 months ago
Connected k-Hop Clustering in Ad Hoc Networks
In wireless ad hoc networks, clustering is one of the most important approaches for many applications. A connected k-hop clustering network is formed by electing clusterheads in k...
Shuhui Yang, Jie Wu, Jiannong Cao
LCN
2008
IEEE
15 years 6 months ago
Key revocation based on Dirichlet multinomial model for mobile ad hoc networks
— The absence of an online trusted authority makes the issue of key revocation in mobile ad hoc networks (MANETs) particularly challenging. In this paper, we present a novel self...
Xinxin Fan, Guang Gong
FASE
2007
Springer
15 years 6 months ago
Maintaining Consistency in Layered Architectures of Mobile Ad-Hoc Networks
Abstract. In this paper we present a layered architecture for modeling workflows in Mobile Ad-Hoc NETworks (manets) using algebraic higher order nets (aho nets). manets are networ...
Julia Padberg, Kathrin Hoffmann, Hartmut Ehrig, To...
ADHOC
2007
173views more  ADHOC 2007»
14 years 12 months ago
QoS multicast routing by using multiple paths/trees in wireless ad hoc networks
In this paper, we investigate the issues of QoS multicast routing in wireless ad hoc networks. Due to limited bandwidth of a wireless node, a QoS multicast call could often be blo...
Huayi Wu, Xiaohua Jia
ADHOC
2007
133views more  ADHOC 2007»
14 years 12 months ago
Secure position-based routing protocol for mobile ad hoc networks
In large and dense mobile ad hoc networks, position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location...
Joo-Han Song, Vincent W. S. Wong, Victor C. M. Leu...