Sciweavers

671 search results - page 31 / 135
» Trust evaluation in ad-hoc networks
Sort
View
ICWN
2009
14 years 11 months ago
Threshold Secret Sharing Authentication Scheme in Noisy Mobile Ad Hoc Networks
- This paper presents a description and performance evaluation of a threshold secret sharing (TSS) authentication scheme for selfsecuring mobile ad hoc networks (MANETs) suffering ...
Shakir Hussain, Hussein Al-Bahadili, Ghassan Issa,...
98
Voted
GECCO
2005
Springer
15 years 7 months ago
Optimizing parameters of a mobile ad hoc network protocol with a genetic algorithm
Mobile ad hoc networks are typically designed and evaluated in generic simulation environments. However the real conditions in which these networks are deployed can be quite diff...
David J. Montana, Jason Redi
CIIT
2004
141views Communications» more  CIIT 2004»
15 years 3 months ago
Dilemma of using high datarate in IEEE 802.11B based multihop ad hoc networks
Due to the fact that high datarate has shorter transmission range, the benefit of using high datarate may be degraded for IEEE 802.11 based multihop ad hoc networks. In this paper...
Frank Yong Li, Andreas Hafslund, Mariann Hauge, Pa...
NCA
2003
IEEE
15 years 7 months ago
Organizing a Distributed Application in a Mobile Ad Hoc Network
A distributed application that operates in an ad hoc network formed by mobile nodes must limit its use of all-to-all communication since the overall capacity of such a network is ...
Cristian Tuduce, Thomas R. Gross
128
Voted
PUC
2006
139views more  PUC 2006»
15 years 1 months ago
EMMA: Epidemic Messaging Middleware for Ad hoc networks
The characteristics of mobile environments, with the possibility of frequent disconnections and fluctuating bandwidth, have forced a rethink of traditional middleware. In particula...
Mirco Musolesi, Cecilia Mascolo, Stephen Hailes