Sciweavers

2691 search results - page 133 / 539
» Securing Ad Hoc Networks
Sort
View
ADHOCNOW
2006
Springer
15 years 10 months ago
A Distributed Protocol for the Bounded-Hops Converge-Cast in Ad-Hoc Networks
Andrea E. F. Clementi, Miriam Di Ianni, Massimo La...
ESAS
2006
Springer
15 years 8 months ago
Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks
Zinaida Benenson, Felix C. Freiling, Birgit Pfitzm...
ESA
2003
Springer
98views Algorithms» more  ESA 2003»
15 years 10 months ago
Network Lifetime and Power Assignment in ad hoc Wireless Networks
In ad-hoc wireless networks, certain network connectivity constraints are of interest because of their practical importance. An example of such a constraint would be strong connec...
Gruia Calinescu, Sanjiv Kapoor, Alexander Olshevsk...
APNOMS
2009
Springer
15 years 11 months ago
Group P2P Network Organization in Mobile Ad-Hoc Network
This paper proposes an effective file searching scheme named Group P2P to reduce the number of message transmission. In the Group P2P, peers distinguish Parent Peer from Child Peer...
Rim Haw, Choong Seon Hong, Dae Sun Kim
MOBIHOC
2002
ACM
16 years 4 months ago
Comparison of broadcasting techniques for mobile ad hoc networks
Network wide broadcasting in Mobile Ad Hoc Networks provides important control and route establishment functionality for a number of unicast and multicast protocols. Considering i...
Brad Williams, Tracy Camp