Sciweavers

2691 search results - page 177 / 539
» Securing Ad Hoc Networks
Sort
View
150
Voted
MOBIHOC
2003
ACM
16 years 4 months ago
On the capacity improvement of ad hoc wireless networks using directional antennas
The capacity of ad hoc wireless networks is constrained by the interference between concurrent transmissions from neighboring nodes. Gupta and Kumar have shown that the capacity o...
Su Yi, Yong Pei, Shivkumar Kalyanaraman
210
Voted
HICSS
2003
IEEE
200views Biometrics» more  HICSS 2003»
15 years 10 months ago
Scatternet Formation of Bluetooth Ad Hoc Networks
Scatternet formation must be addressed before any ad hoc network protocol can be run over Bluetooth. This is due to the frequency hop nature and piconet unit of Bluetooth. In this...
Bin Zhen, Jonghun Park, Yongsuk Kim
DIALM
2003
ACM
175views Algorithms» more  DIALM 2003»
15 years 10 months ago
Equilibria in topology control games for ad hoc networks
We study topology control problems in ad hoc networks, where network nodes get to choose their power levels in order to ensure desired connectivity properties. Unlike most other w...
Stephan Eidenbenz, V. S. Anil Kumar, Sibylle Zust
SAGA
2007
Springer
15 years 11 months ago
Randomized Algorithms and Probabilistic Analysis in Wireless Networking
Abstract. Devices connected wirelessly, in various forms including computers, hand-held devices, ad hoc networks, and embedded systems, are expected to become ubiquitous all around...
Aravind Srinivasan
MAS
1998
Springer
145views Communications» more  MAS 1998»
15 years 9 months ago
Language Issues in Mobile Program Security
Abstract. Many programming languages have been developed and implemented for mobile code environments. They are typically quite expressive. But while security is an important aspec...
Dennis M. Volpano, Geoffrey Smith