Sciweavers

671 search results - page 49 / 135
» Trust evaluation in ad-hoc networks
Sort
View
117
Voted
W2GIS
2005
Springer
15 years 7 months ago
Resource Discovery Using Spatio-temporal Information in Mobile Ad-Hoc Networks
In this paper we examine the benefit of reports about resources in mobile ad-hoc networks. Each disseminated report represents information about a spatio-temporal event, such as th...
Ouri Wolfson, Bo Xu, Huabei Yin, Naphtali Rishe
125
Voted
ICC
2000
IEEE
179views Communications» more  ICC 2000»
15 years 6 months ago
A Comparison of On-Demand and Table Driven Routing for Ad-Hoc Wireless Networks
—We introduce WRP-Lite, which is a table-driven routing protocol that uses non-optimal routes, and compare its performance with the performance of the dynamic source routing (DSR...
Jyoti Raju, J. J. Garcia-Luna-Aceves
143
Voted
IJNSEC
2010
141views more  IJNSEC 2010»
14 years 8 months ago
Protection of an Intrusion Detection Engine with Watermarking in Ad Hoc Networks
In this paper we present an intrusion detection engine comprised of two main elements; firstly, a neural network for the actual detection task and secondly watermarking techniques...
Aikaterini Mitrokotsa, Nikos Komninos, Christos Do...
174
Voted
ICNS
2006
IEEE
15 years 8 months ago
Mobile Ad Hoc Networking Approach to Detecting and Querying Events Related to Farm Animals
This paper proposes a mobile ad hoc networking approach to detecting and querying events related to farm animals such as oestrus, animal diseases and decreased efficiency of pastu...
Milena Radenkovic, Bartosz Wietrzyk
TC
2008
15 years 1 months ago
Iterative Local Solutions for Connected Dominating Set in Ad Hoc Wireless Networks
We propose a general framework of the iterative local solution (ILS) for computing a connected dominating set (CDS) in ad hoc wireless networks, which include wireless sensor netwo...
Jie Wu, Fei Dai, Shuhui Yang