Sciweavers

2691 search results - page 144 / 539
» Securing Ad Hoc Networks
Sort
View
ISCC
2009
IEEE
177views Communications» more  ISCC 2009»
15 years 11 months ago
SECLOUD: Source and Destination Seclusion Using Clouds for wireless ad hoc networks
—The privacy of communicating entities in wireless ad hoc networks is extremely important due to the potential of their being identified and subsequently subjected to attacks (e...
Razvi Doomun, Thaier Hayajneh, Prashant Krishnamur...
GLOBECOM
2007
IEEE
15 years 11 months ago
Uncertainty Mitigation for Utility-Oriented Routing in Wireless Ad Hoc Networks
— Link and node reliability are important metrics in wireless ad hoc networks. Therefore, evaluating and quantifying reliability has become the cornerstone of research in this ...
Feng Li, Avinash Srinivasan, Mingming Lu, Jie Wu
129
Voted
ICC
2007
IEEE
134views Communications» more  ICC 2007»
15 years 11 months ago
A MAC Protocol for Maximum Stream Allocation Depending on the Number of Antennas and Received RTS Packets in MIMO Ad Hoc Network
— MIMA-MAC is the most attractive MAC protocol for MIMO ad hoc networks, which consist of nodes with multiple antennas. MIMA-MAC, however, uses only a half of antennas for data t...
Motoki Shirasu, Iwao Sasase
ICC
2007
IEEE
146views Communications» more  ICC 2007»
15 years 11 months ago
Media Access Control with Spatial Correlation for MIMO Ad Hoc Networks
– MIMO (Multiple Input Multiple Output) is capable of offering several-fold increase in spectral efficiency over singleantenna systems through spatial processing. However, curren...
Bing Wen Ke, Ying Jun Zhang, Soung Chang Liew
ICC
2007
IEEE
117views Communications» more  ICC 2007»
15 years 11 months ago
ESPRIT-Based Directional MAC Protocol for Mobile Ad Hoc Networks
— The use of directional antennas in mobile ad hoc networks has shown to offer large potential throughput gains relative to omnidirectional antennas. When used in ad hoc networks...
Kun Liu, Walaa Hamouda, Amr Youssef