Sciweavers

2691 search results - page 415 / 539
» Securing Ad Hoc Networks
Sort
View
129
Voted
COMCOM
2006
80views more  COMCOM 2006»
15 years 4 months ago
A framework for seamless service interworking in ad-hoc networks
Local area wireless networks are becoming commonplace in our everyday lives. It would be beneficial to establish such wireless networks in an ad-hoc manner so that they are infras...
Linda Källström, Simone Leggio, Jukka Ma...
151
Voted
ICCS
2001
Springer
15 years 9 months ago
The Policy Machine for Security Policy Management
Abstract. Many different access control policies and models have been developed to suit a variety of goals; these include Role-Based Access Control, One-directional Information Flo...
Vincent C. Hu, Deborah A. Frincke, David F. Ferrai...
MOBIHOC
2005
ACM
16 years 4 months ago
TCP over multihop 802.11 networks: issues and performance enhancement
Analyzing TCP operation over 802.11 multihop ad hoc networks involves a cross-layer study. In this work, we investigate the effect of congestion and MAC contention on the interact...
Kitae Nahm, Ahmed Helmy, C. C. Jay Kuo
TCOM
2010
168views more  TCOM 2010»
14 years 11 months ago
A unified analysis of routing protocols in MANETs
This paper presents a mathematical framework for the evaluation of the performance of proactive and reactive routing protocols in mobile ad hoc networks (MANETs). This unified fram...
Hui Xu, Xianren Wu, Hamid R. Sadjadpour, J. J. Gar...
LCN
2008
IEEE
15 years 11 months ago
Understanding and using mobility on Publish/Subscribe based architectures for MANETs
Abstract—Mobile Ad Hoc Networks present several new challenges, mainly due to mobility. Publish/Subscribe is a communication paradigm that fits this network model well since the...
Cristiano G. Rezende, Azzedine Boukerche, Bruno P....