Sciweavers

225 search results - page 22 / 45
» Privacy-enhanced social network routing in opportunistic net...
Sort
View
GLOBECOM
2006
IEEE
15 years 3 months ago
Integrated Scheduling of Application- and Network-Layer Tasks in Delay-Tolerant MANETs
Abstract— Natural or man-made disasters can partition networks while threatening human lives. Because conventional Mobile Ad-Hoc Networks (MANETs) cannot route messages across pa...
José Carlos Brustoloni, Sherif M. Khattab, ...
88
Voted
CSE
2009
IEEE
15 years 4 months ago
Real World Routing Using Virtual World Information
—In this paper, we propose to leverage social graphs from Online Social Networks (OSN) to improve the forwarding efficiency of mobile networks, more particularly Delay Tolerant ...
Pan Hui, Nishanth R. Sastry
JSAC
2011
191views more  JSAC 2011»
14 years 4 months ago
CRP: A Routing Protocol for Cognitive Radio Ad Hoc Networks
Abstract—Cognitive radio (CR) technology enables the opportunistic use of the vacant licensed frequency bands, thereby improving the spectrum utilization. However, the CR operati...
Kaushik R. Chowdhury, Ian F. Akyildiz
WWW
2008
ACM
15 years 10 months ago
Privacy-enhanced sharing of personal content on the web
Publishing personal content on the web is gaining increased popularity with dramatic growth in social networking websites, and availability of cheap personal domain names and host...
Mohammad Mannan, Paul C. van Oorschot
ACSAC
2007
IEEE
15 years 4 months ago
Countering False Accusations and Collusion in the Detection of In-Band Wormholes
Cooperative intrusion detection techniques for MANETs utilize ordinary computing hosts as network intrusion sensors. If compromised, these hosts may inject bogus data into the int...
Daniel Sterne, Geoffrey Lawler, Richard Gopaul, Br...