Sciweavers

2691 search results - page 54 / 539
» Securing Ad Hoc Networks
Sort
View
CCS
2008
ACM
15 years 1 months ago
Revocation games in ephemeral networks
A frequently proposed solution to node misbehavior in mobile ad hoc networks is to use reputation systems. But in ephemeral networks - a new breed of mobile networks where contact...
Maxim Raya, Mohammad Hossein Manshaei, Márk...
PERCOM
2004
ACM
15 years 11 months ago
Towards Scalable P2P Computing for Mobile Ad Hoc Networks
In mobile ad hoc networks, nodes interact peer-to-peer. They self-organize, share workloads and provide services that they also use. There are middleware platforms, designed for t...
Marco Conti, Enrico Gregori, Giovanni Turi
MOBIHOC
2005
ACM
15 years 11 months ago
A cross-layer optimization of gnutella for mobile ad hoc networks
Marco Conti, Enrico Gregori, Giovanni Turi
MOBIHOC
2001
ACM
15 years 11 months ago
Making link-state routing scale for ad hoc networks
Cesar A. Santivanez, Ram Ramanathan, Ioannis Stavr...