Sciweavers

1835 search results - page 231 / 367
» Security-aware ad hoc routing for wireless networks
Sort
View
INFOCOM
2003
IEEE
15 years 3 months ago
Delay Limited Capacity of Ad hoc Networks: Asymptotically Optimal Transmission and Relaying Strategy
— The delay limited capacity of an ad hoc wireless network confined to a finite region is investigated. A transmission and relaying strategy making use of the nodes’ motion t...
Eugene Perevalov, Rick S. Blum
ICWN
2004
14 years 11 months ago
An Architecture Supporting Run-Time Upgrade of Proxy-Based Services in Ad Hoc Networks
Abstract-- In the proxy approach to Service Oriented Computing, a service advertises a proxy, which is searched for, retrieved and used by interested clients as a local handle to t...
Rohan Sen, Radu Handorean, Gregory Hackmann, Gruia...
JSAC
2006
114views more  JSAC 2006»
14 years 10 months ago
SCAN: self-organized network-layer security in mobile ad hoc networks
Protecting the network layer from malicious attacks is an important yet challenging security issue in mobile ad hoc networks. In this paper we describe SCAN, a unified networklayer...
Hao Yang, J. Shu, Xiaoqiao Meng, Songwu Lu
PODC
2003
ACM
15 years 3 months ago
Geometric ad-hoc routing: of theory and practice
All too often a seemingly insurmountable divide between theory and practice can be witnessed. In this paper we try to contribute to narrowing this gap in the field of ad-hoc rout...
Fabian Kuhn, Roger Wattenhofer, Yan Zhang, Aaron Z...
SECON
2010
IEEE
14 years 8 months ago
Multiple Access Mechanisms with Performance Guarantees for Ad-Hoc Networks
This paper bears on the design and the quantitative evaluation of MAC mechanisms for wireless ad-hoc networks with performance guarantees. By this, we mean mechanisms where each ac...
Paola Bermolen, François Baccelli