Sciweavers

1165 search results - page 140 / 233
» Secure data communication in mobile ad hoc networks
Sort
View
PERCOM
2004
ACM
16 years 1 months ago
Learning to Detect User Activity and Availability from a Variety of Sensor Data
Using a networked infrastructure of easily available sensors and context-processing components, we are developing applications for the support of workplace interactions. Notions o...
Dave Snowdon, Jean-Luc Meunier, Martin Mühlen...
MOBICOM
1999
ACM
15 years 6 months ago
Multicast Operation of the Ad-Hoc On-Demand Distance Vector Routing Protocol
An ad-hoc network is the cooperative engagement of a collection of typically wireless mobile nodes without the required intervention of any centralized access point or existing ...
Elizabeth M. Belding-Royer, Charles E. Perkins
SENSYS
2003
ACM
15 years 7 months ago
Minimum-energy asynchronous dissemination to mobile sinks in wireless sensor networks
Data dissemination from sources to sinks is one of the main functions in sensor networks. In this paper, we propose SEAD, a Scalable Energy-efficient Asynchronous Dissemination pr...
Hyung Seok Kim, Tarek F. Abdelzaher, Wook Hyun Kwo...
ICCCN
2008
IEEE
15 years 8 months ago
A Trust Model Robust to Slander Attacks in Ad Hoc Networks
— Slander attacks represent a significant danger to distributed reputation systems. Malicious nodes may collude to lie about the reputation of a particular neighbor and cause se...
Pedro B. Velloso, Rafael P. Laufer, Otto Carlos Mu...
TMC
2008
152views more  TMC 2008»
15 years 1 months ago
CDR-MAC: A Protocol for Full Exploitation of Directional Antennas in Ad Hoc Wireless Networks
In this paper, we propose a new Medium Access Control (MAC) protocol for full exploitation of directional antennas in wireless networks. The protocol introduces a circular directio...
Thanasis Korakis, Gentian Jakllari, Leandros Tassi...