Sciweavers

1624 search results - page 288 / 325
» Requirements for Privacy-Enhancements in Mobile Ad Hoc Netwo...
Sort
View
INFOCOM
2003
IEEE
15 years 7 months ago
Dynamic Power Allocation and Routing for Time Varying Wireless Networks
—We consider dynamic routing and power allocation for a wireless network with time-varying channels. The network consists of power constrained nodes that transmit over wireless l...
Michael J. Neely, Eytan Modiano, Charles E. Rohrs
ADHOC
2007
104views more  ADHOC 2007»
15 years 1 months ago
An overlay approach to data security in ad-hoc networks
While it has been argued that application-layer overlay protocols can enhance services in mobile ad-hoc networks, hardly any empirical data is available on the throughput and dela...
Jörg Liebeherr, Guangyu Dong
INFOCOM
2007
IEEE
15 years 8 months ago
Mobility Reduces Uncertainty in MANETs
Abstract— Evaluating and quantifying trust stimulates collaboration in mobile ad hoc networks (MANETs). Many existing reputation systems sharply divide the trust value into right...
Feng Li, Jie Wu
ICASSP
2008
IEEE
15 years 8 months ago
NeSh: A joint shadowing model for links in a multi-hop network
Accurate analysis and simulation in multi-hop (sensor, ad hoc, and mesh) networks requires accurate representation of physical layer fading processes. Current models either ignore...
Neal Patwari, Piyush Agrawal
SAINT
2003
IEEE
15 years 7 months ago
Distributed Authentication for Peer-to-Peer Networks
A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Securi...
Shardul Gokhale, Partha Dasgupta