Sciweavers

1862 search results - page 325 / 373
» Routing and Security in Mobile Ad Hoc Networks
Sort
View
ACSAC
1998
IEEE
15 years 3 months ago
Concentric Supervision of Security Applications: A New Security Management Paradigm
This paper questions the status quo regarding Security Management (SM) tools that function in an isolated, monolithic fashion. People work best by interacting with others and with...
P. C. Hyland, Ravi S. Sandhu
WCNC
2008
IEEE
15 years 5 months ago
A Mechanism Design-Based Multi-Leader Election Scheme for Intrusion Detection in MANET
—In this paper, we study the election of multiple leaders for intrusion detection in the presence of selfish nodes in mobile ad hoc networks (MANETs). To balance the resource co...
Noman Mohammed, Hadi Otrok, Lingyu Wang, Mourad De...
DEXA
2008
Springer
98views Database» more  DEXA 2008»
15 years 1 months ago
REALM: Replication of Data for a Logical Group Based MANET Database
Abstract. Mobile Ad-Hoc Networks, or MANETs, provide communication between free-roaming mobile hosts without a fixed infrastructure. These MANETs operate under conditions of limite...
Anita Vallur, Le Gruenwald, Nick Hunter
TNC
2004
140views Education» more  TNC 2004»
15 years 26 days ago
Seamless Multimedia Communications in Heterogeneous Mobile Access Networks
With the advent of the new wireless technologies allowing for higher data rates, the provision of high quality multimedia services over the upcoming wireless and mobile networks i...
Pedro M. Ruiz, Juan A. Botía, Antonio F. G&...
SPAA
2005
ACM
15 years 5 months ago
Constant density spanners for wireless ad-hoc networks
An important problem for wireless ad hoc networks has been to design overlay networks that allow time- and energy-efficient routing. Many local-control strategies for maintaining...
Kishore Kothapalli, Christian Scheideler, Melih On...