Sciweavers

1835 search results - page 87 / 367
» Security-aware ad hoc routing for wireless networks
Sort
View
INFOCOM
2011
IEEE
14 years 2 months ago
Throughput and delay analysis of hybrid wireless networks with multi-hop uplinks
—How much information can one send through a random ad hoc network of
Devu Manikantan Shila, Yu Cheng, Tricha Anjali
99
Voted
IWCMC
2009
ACM
15 years 5 months ago
Dynamic trust establishment in emergency ad hoc networks
This paper proposes a dynamic trust establishment protocol that enables the nodes of an ad hoc network to establish security associations among each other in a distributed and pee...
Christos A. Papageorgiou, Konstantinos Birkos, Tas...
72
Voted
ICPPW
2003
IEEE
15 years 4 months ago
Trusting Routers and Relays in Ad hoc Networks
The current generation of ad hoc networks relies on other nodes in the network for routing information and for routing the packets. These networks are based on the fundamental ass...
Prashant Dewan, Partha Dasgupta
GLOBECOM
2007
IEEE
15 years 5 months ago
Two-Hop Two-Path Voice Communications Over a Mobile Ad-Hoc Network
Abstract— We consider two-hop communication of a delaysensitive, memoryless Gaussian source over two independent paths in an ad-hoc network. To capture the behavior an ad-hoc net...
Jagadeesh Balam, Jerry D. Gibson
MSWIM
2004
ACM
15 years 4 months ago
Exploring long lifetime routing (LLR) in ad hoc networks
In mobile ad hoc networks, node mobility causes links between nodes to break frequently, thus terminating the lifetime of the routes containing those links. An alternative route h...
Zhao Cheng, Wendi Beth Heinzelman