Sciweavers

2691 search results - page 51 / 539
» Securing Ad Hoc Networks
Sort
View
WMCSA
2003
IEEE
15 years 5 months ago
Design and Evaluation of a Metropolitan Area Multitier Wireless Ad Hoc Network Architecture
Few real-world applications of mobile ad hoc networks have been developed or deployed outside the military environment, and no traces of actual node movement in a real ad hoc netw...
Jorjeta G. Jetcheva, Yih-Chun Hu, Santashil PalCha...
ICDCSW
2003
IEEE
15 years 5 months ago
Survivable Multi-Level Ad-Hoc Group Operations
In this paper we investigate the survivability of multilevel ad-hoc groups for critical operations through a case study. We aim to provide a formal trust framework for establishin...
Dan Zhou, Jie Wu
GECCO
2007
Springer
268views Optimization» more  GECCO 2007»
15 years 6 months ago
Vulnerability analysis and security framework (BeeSec) for nature inspired MANET routing protocols
Design, development and evaluation of adaptive, scalable, and power aware Bio/Nature inspired routing protocols has received a significant amount of attention in the recent past....
Nauman Mazhar, Muddassar Farooq
IPPS
2006
IEEE
15 years 5 months ago
k-anycast routing schemes for mobile ad hoc networks
— Anycast is a communication paradigm that was first introduced to the suit of routing protocols in IPv6 networks. In anycast, a packet is intended to be delivered to one of the...
Bing Wu, Jie Wu
NETWORKING
2011
14 years 2 months ago
Epidemic Spread in Mobile Ad Hoc Networks: Determining the Tipping Point
Short-range, point-to-point communications for mobile users enjoy increasing popularity, particularly with the rise in Bluetooth-equipped mobile devices. Unfortunately, virus write...
Nicholas Valler, B. Aditya Prakash, Hanghang Tong,...