Sciweavers

1862 search results - page 326 / 373
» Routing and Security in Mobile Ad Hoc Networks
Sort
View
ANSS
2003
IEEE
15 years 4 months ago
An ns-based Bluetooth Topology Construction Simulation Environment
Bluetooth is an emerging technology in wireless applications, and many related issues are yet to be explored both in academia and industry. Because of the complexity and the dynam...
Chia-Jui Hsu, Yuh-Jzer Joung
GLOBECOM
2008
IEEE
15 years 6 months ago
Maximizing Transport Capacity for Geographic Transmission on Nakagami-m Channels
—In mobile ad hoc networks (MANETs), conventional packet forwarding schemes that pre-select the next-hop receivers for a packet may fail if the channel coherence time is on the o...
Tathagata D. Goswami, John M. Shea, Tan F. Wong, M...
ECEASST
2008
112views more  ECEASST 2008»
14 years 11 months ago
Flexible Modeling of Emergency Scenarios using Reconfigurable Systems
In emergency scenarios we can obtain a more effective coordination among team members constituting a mobile ad hoc network (MANET) through the use of reconfigurable systems. This ...
Kathrin Hoffmann, Hartmut Ehrig, Julia Padberg
ACSC
2004
IEEE
15 years 3 months ago
Establishing Trust In Pure Ad-hoc Networks
An ad-hoc network of wireless nodes is a temporarily formed network, created, operated and managed by the nodes themselves. It is also often termed an infrastructure-less, self-or...
Asad Amir Pirzada, Chris McDonald
ICISC
2001
156views Cryptology» more  ICISC 2001»
15 years 26 days ago
A Distributed Light-Weight Authentication Model for Ad-hoc Networks
Abstract. In this work we present a security model for low-value transactions in ad-hoc networks in which we focus on authentication since this is the core requirement for commerci...
André Weimerskirch, Gilles Thonet