Sciweavers

1624 search results - page 40 / 325
» Requirements for Privacy-Enhancements in Mobile Ad Hoc Netwo...
Sort
View
137
Voted
ICWN
2009
14 years 10 months ago
Efficient Medium Access Control with IEEE 802.11 for Mobile Ad Hoc Networks
The IEEE 802.11 Medium Access Control (MAC) protocol has inherent weakness of channel wastage while operating a Mobile Ad hoc Network (MANET). In this paper, we therefore propose s...
Zalal Uddin Mohammad Abusina, Mesbah Uddin, Salahu...
ISCAPDCS
2003
15 years 2 months ago
Performance of a Jini-based Ad Hoc Network Authentication Scheme
Ad hoc networks provide a dynamically reconfigurable network infrastructure where entities can participate at will. Jini technology can be used to implement an ad hoc network, and...
M. M. McMahon, D. M. Needham, J. B. Datko
134
Voted
ICC
2009
IEEE
135views Communications» more  ICC 2009»
14 years 10 months ago
Load Aware Broadcast in Mobile Ad Hoc Networks
In a wireless ad hoc network, the main issue of a good broadcast protocol is to attain maximum reachability with minimal packet forwarding. Existing protocols address this issue by...
Md. Tanvir Al Amin, Sukarna Barua, Sudip Vhaduri, ...
88
Voted
PDPTA
2004
15 years 2 months ago
Agent-Based Embedded Monitoring System for Ubiquitous Networks Environments
Contrary to current wireless network systems, ubiquitous network environment has quite dynamic and diversified devices which aim at best meeting the requirements of specific group ...
Hyo-Sung Kang, Jong-Mu Choi, Jai-Hoon Kim, Young-B...
ICDCS
2011
IEEE
14 years 9 days ago
JR-SND: Jamming-Resilient Secure Neighbor Discovery in Mobile Ad Hoc Networks
Abstract—Secure neighbor discovery is fundamental to mobile ad hoc networks (MANETs) deployed in hostile environments and refers to the process in which two neighboring nodes exc...
Rui Zhang 0007, Yanchao Zhang, Xiaoxia Huang