Sciweavers

2691 search results - page 174 / 539
» Securing Ad Hoc Networks
Sort
View
ICPPW
2003
IEEE
15 years 10 months ago
Perfect Secrecy in Wireless Networks
In a classic paper, among a multitude of other security issues, Claude E. Shannon defined perfect secrecy for a pair of secure computers communicating over an insecure link. The ...
Phillip G. Bradford, Olga V. Gavrylyako, Randy K. ...
187
Voted
LCN
1998
IEEE
15 years 9 months ago
QoS Routing in Ad Hoc Wireless Networks
Abstract-- The emergence of nomadic applications have recently generated much interest in wireless network infrastructures that support real-time communications. In this paper, we ...
C. R. Lin
PERCOM
2005
ACM
16 years 4 months ago
The Problem of Bluetooth Pollution and Accelerating Connectivity in Bluetooth Ad-Hoc Networks
This paper investigates a real-world problem termed "Bluetooth (BTH) pollution", which is expected to become commonplace as the mass deployment of BTH devices continues....
Somil Asthana, Dimitris N. Kalofonos
GLOBECOM
2009
IEEE
15 years 11 months ago
A Practical Approach for Providing QoS in Multichannel Ad-Hoc Networks Using Spectrum Width Adaptation
Abstract—Multichannel wireless networks provide the flexibility to utilize the available spectrum efficiently for achieving improved system performance in terms of throughput a...
Vijay Raman, Matthew C. Caesar
173
Voted
CISS
2007
IEEE
15 years 11 months ago
Relay Placement and Movement Control for Realization of Fault-Tolerant Ad Hoc Networks
— Wireless communication is a critical component of battlefield networks. Nodes in a battlefield network exist in hostile environments and thus fault-tolerance against node and...
Abhishek Kashyap, Mark A. Shayman