Sciweavers

671 search results - page 44 / 135
» Trust evaluation in ad-hoc networks
Sort
View
VTC
2006
IEEE
136views Communications» more  VTC 2006»
15 years 8 months ago
M3RP: Multi-rate/Multi-range Multicast Routing Protocol for Mobile Ad Hoc Networks
— Group Communication services have become more and more important in mobile ad hoc networks (MANETs). The use of multicast transmission techniques in MANETs has been shown to ha...
Jenhui Chen, Jhenjhong Guo, Chih-Chieh Wang
MSWIM
2004
ACM
15 years 7 months ago
Consistency challenges of service discovery in mobile ad hoc networks
Emerging “urban” ad hoc networks resulting from a large number of individual WLAN users challenge the way users could explore and interact with their physical surroundings. Ro...
Christian Frank, Holger Karl
ICC
2009
IEEE
153views Communications» more  ICC 2009»
15 years 8 months ago
Detecting Malicious Packet Dropping in the Presence of Collisions and Channel Errors in Wireless Ad Hoc Networks
—Detecting malicious packet dropping is important in ad hoc networks to combat a variety of security attacks such as blackhole, greyhole, and wormhole attacks. We consider the de...
Thaier Hayajneh, Prashant Krishnamurthy, David Tip...
111
Voted
VTC
2007
IEEE
15 years 8 months ago
Predicting Parking Lot Occupancy in Vehicular Ad Hoc Networks
— The search for free parking places is a promising application for vehicular ad hoc networks (VANETs). In order to guide drivers to a free parking place at their destination, it...
Murat Caliskan, Andreas Barthels, Björn Scheu...
MOBIHOC
2001
ACM
16 years 1 months ago
Implicit source routes for on-demand ad hoc network routing
In an ad hoc network, the use of source routing has many advantages, including simplicity, correctness, and flexibility. For example, all routing decisions for a packet are made b...
Yih-Chun Hu, David B. Johnson