Sciweavers

1378 search results - page 156 / 276
» Programming in mobile ad hoc networks
Sort
View
SUTC
2006
IEEE
15 years 7 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
104
Voted
WCNC
2008
IEEE
15 years 8 months ago
A Collaborative Quasi-Linear Programming Framework for Ad Hoc Sensor Localization
—In this paper, we propose a collaborative localization scheme which utilizes, in addition to the range estimates to nodes with known locations (anchors), the range estimates bet...
Tao Jia, R. Michael Buehrer
IJHPCN
2006
114views more  IJHPCN 2006»
15 years 1 months ago
Improved schemes for power-efficient broadcast in ad hoc networks
: Ad hoc wireless networks are a special type of wireless network in which a collection of mobile hosts (nodes) with wireless network interfaces may form a temporary network withou...
Xiao Chen, Jian Shen
ISCAS
2005
IEEE
199views Hardware» more  ISCAS 2005»
15 years 7 months ago
Congestion-optimized scheduling of video over wireless ad hoc networks
We analyze the benefits of information sharing between the application layer and the transport layer, for streaming video encoded at several different qualities, in a mobile wir...
Eric Setton, Xiaoqing Zhu, Bernd Girod
HICSS
2005
IEEE
144views Biometrics» more  HICSS 2005»
15 years 7 months ago
Secure Dynamic Source Routing
— In this paper we present the Secure Dynamic Source Routing protocol for Mobile Ad hoc Networks that prevents a lot of potential attacks to these kind of networks. We also prese...
Frank Kargl, Alfred Geiss, Stefan Schlott, Michael...