Sciweavers

671 search results - page 67 / 135
» Trust evaluation in ad-hoc networks
Sort
View
115
Voted
PERCOM
2005
ACM
16 years 1 months ago
Trading Latency for Energy in Wireless Ad Hoc Networks Using Message Ferrying
Power management is a critical issue in wireless ad hoc networks where the energy supply is limited. In this paper, we investigate a routing paradigm, Message Ferrying (MF), to sa...
Hyewon Jun, Wenrui Zhao, Mostafa H. Ammar, Ellen W...
SIMUTOOLS
2008
15 years 3 months ago
Simulation of ad hoc networks: ns-2 compared to JiST/SWANS
For the evaluation of ad hoc network protocols, researchers traditionally use simulations because they easily allow for a large number of nodes and reproducible environment condit...
Elmar Schoch, Michael Feiri, Frank Kargl, Michael ...
ASMTA
2008
Springer
200views Mathematics» more  ASMTA 2008»
15 years 4 months ago
Bottleneck Analysis for Two-Hop IEEE 802.11e Ad Hoc Networks
Recently, a quality-of-service (QoS) extension of the IEEE 802.11 standard (known as IEEE 802.11e) for wireless LANs has been proposed. We present a versatile and accurate performa...
Anne Remke, Boudewijn R. Haverkort, Geert J. Heije...
AHSWN
2006
206views more  AHSWN 2006»
15 years 2 months ago
Zone-Based Intrusion Detection for Mobile Ad Hoc Networks
ABSTRACT Intrusion Detection Systems (IDSs) for Mobile Ad hoc NETworks (MANETs) are indispensable since traditional intrusion prevention based techniques are not strong enough to p...
Bo Sun, Kui Wu, Udo W. Pooch
MOBIHOC
2004
ACM
16 years 1 months ago
Localized algorithms for energy efficient topology in wireless ad hoc networks
We propose several novel localized algorithms to construct energy efficient routing structures for homogeneous wireless ad hoc networks, where all nodes have same maximum transmis...
Wen-Zhan Song, Yu Wang 0003, Xiang-Yang Li