Sciweavers

671 search results - page 4 / 135
» Trust evaluation in ad-hoc networks
Sort
View
WOWMOM
2005
ACM
201views Multimedia» more  WOWMOM 2005»
15 years 3 months ago
Real-Time Intrusion Detection for Ad Hoc Networks
A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. The widely accepted existing routing protocols de...
Ioanna Stamouli, Patroklos G. Argyroudis, Hitesh T...
CEC
2007
IEEE
15 years 1 months ago
Preventing selfish behavior in Ad Hoc networks
Cooperation enforcement is one of the key issues in ad hoc networks. In this paper we proposes a new strategy driven approach that aims at discouraging selfish behavior among netwo...
Marcin Seredynski, Pascal Bouvry, Mieczyslaw A. Kl...
NCA
2003
IEEE
15 years 2 months ago
AdHocFS: Sharing Files in WLANs
This paper presents the ADHOCFS file system for mobile users, which realizes transparent, adaptive file access according to the users’ specific situations (e.g., device in us...
Malika Boulkenafed, Valérie Issarny
WMCSA
2003
IEEE
15 years 2 months ago
Design and Evaluation of a Metropolitan Area Multitier Wireless Ad Hoc Network Architecture
Few real-world applications of mobile ad hoc networks have been developed or deployed outside the military environment, and no traces of actual node movement in a real ad hoc netw...
Jorjeta G. Jetcheva, Yih-Chun Hu, Santashil PalCha...
INFOCOM
2006
IEEE
15 years 3 months ago
Trust Evaluation in Anarchy: A Case Study on Autonomous Networks
— With the explosive growth of network techniques, in particular wireless communications, the traditional centralized, fixed networks can no longer satisfy the enormous demands ...
Tao Jiang, John S. Baras