Sciweavers

2691 search results - page 78 / 539
» Security in Ad Hoc Networks
Sort
View
ACSAC
1998
IEEE
15 years 6 months ago
Concentric Supervision of Security Applications: A New Security Management Paradigm
This paper questions the status quo regarding Security Management (SM) tools that function in an isolated, monolithic fashion. People work best by interacting with others and with...
P. C. Hyland, Ravi S. Sandhu
NETWORKING
2004
15 years 3 months ago
A Lightweight Content Replication Scheme for Mobile Ad Hoc Environments
Vineet Thanedar, Kevin C. Almeroth, Elizabeth M. B...
95
Voted
KIVS
2005
Springer
15 years 7 months ago
Improving the Usable Capacity of Ad Hoc Networks
Recent research has shown that multi-hop ad hoc networks suffer from a low capacity and moreover that an individual node’s capacity for long-distance communication decreases the...
Christian Maihöfer, Tim Leinmüller, Rein...
ADHOC
2006
124views more  ADHOC 2006»
15 years 2 months ago
Mobility-capacity-delay trade-off in wireless ad hoc networks
We show that there is a trade-off among mobility, capacity, and delay in ad hoc networks. More specifically, we consider two schemes for node mobility in ad hoc networks. We divid...
Renato M. de Moraes, Hamid R. Sadjadpour, J. J. Ga...