Sciweavers

2691 search results - page 54 / 539
» Securing Ad Hoc Networks
Sort
View
CCS
2008
ACM
15 years 4 months ago
Revocation games in ephemeral networks
A frequently proposed solution to node misbehavior in mobile ad hoc networks is to use reputation systems. But in ephemeral networks - a new breed of mobile networks where contact...
Maxim Raya, Mohammad Hossein Manshaei, Márk...
PERCOM
2004
ACM
16 years 1 months ago
Towards Scalable P2P Computing for Mobile Ad Hoc Networks
In mobile ad hoc networks, nodes interact peer-to-peer. They self-organize, share workloads and provide services that they also use. There are middleware platforms, designed for t...
Marco Conti, Enrico Gregori, Giovanni Turi
MOBIHOC
2005
ACM
16 years 1 months ago
A cross-layer optimization of gnutella for mobile ad hoc networks
Marco Conti, Enrico Gregori, Giovanni Turi
MOBIHOC
2001
ACM
16 years 1 months ago
Making link-state routing scale for ad hoc networks
Cesar A. Santivanez, Ram Ramanathan, Ioannis Stavr...