Sciweavers

671 search results - page 34 / 135
» Trust evaluation in ad-hoc networks
Sort
View
ICDCSW
2005
IEEE
15 years 7 months ago
Increasing Attack Resiliency of Wireless Ad Hoc and Sensor Networks
An ad hoc or sensor network that is employed for security sensitive applications is expected to tolerate a certain quantity of maliciously behaving nodes. Algorithms must be desig...
Harald Vogt
127
Voted
TWC
2010
14 years 8 months ago
On the Impact of Channel Estimation Errors on MAC Protocols for MIMO Ad Hoc Networks
In this paper, we evaluate the performance of a Medium Access Control (MAC) protocol for MIMO ad hoc networks under imperfect channel estimation. To this end, we also present an an...
Davide Chiarotto, Paolo Casari, Michele Zorzi
148
Voted
AINTEC
2006
Springer
15 years 5 months ago
Application Performance Assessment on Wireless Ad Hoc Networks
Using ad hoc networks as alternative means of communication in disaster situations is a salutary solution. However, analysing application performance is mandatory for evaluating su...
Razvan Beuran, Ken-ichi Chinen, Khin Thida Latt, T...
ICC
2007
IEEE
136views Communications» more  ICC 2007»
15 years 8 months ago
Cross-layer Networking for Peer Databases over Wireless Ad-Hoc Communities
— Recent advances in wireless technology as well as in electronics industry have given rise to the widespread of wireless ad-hoc networking. Expanding data-centric applications t...
Evangelos Papapetrou, Efthymia Rova, Apostolos Zar...
IFIP
2004
Springer
15 years 7 months ago
Activity-Based User Modeling in Service-Oriented Ad-Hoc-Networks
Wireless network research still lacks methods to integratively evaluate the performance that can be expected from application layer protocols. The user behavior is predominantly aï...
Tobias Breyer, Michael Klein, Philipp Obreiter, Bi...