Sciweavers

1390 search results - page 94 / 278
» Virtual Mobile Nodes for Mobile Ad Hoc Networks
Sort
View
PERCOM
2007
ACM
16 years 1 months ago
SMOCK: A Self-Contained Public Key Management Scheme for Mission-Critical Wireless Ad Hoc Networks
Mobile ad hoc networks show great potential in emergency response and/or recovery. Such mission-critical applications demand security service be "anywhere", "anytim...
Wenbo He, Ying Huang, Klara Nahrstedt, Whay Chiou ...
INFOSCALE
2006
ACM
15 years 7 months ago
A predictive approach to achieving consistency in cooperative caching in MANET
Cooperative caching is a very important technique for efficient data dissemination and sharing in mobile ad hoc networks (MANETs). Many applications have requirements on the consi...
Yu Huang 0002, Jiannong Cao, Beihong Jin
INFOCOM
2009
IEEE
15 years 8 months ago
Beyond Trilateration: On the Localizability of Wireless Ad-Hoc Networks
— The proliferation of wireless and mobile devices has fostered the demand of context aware applications, in which location is often viewed as one of the most significant context...
Zheng Yang, Yunhao Liu, Xiang-Yang Li
COLCOM
2008
IEEE
15 years 8 months ago
Security through Collaboration in MANETs
It is well understood that Mobile Ad Hoc Networks (MANETs) are extremely susceptible to a variety of attacks, and traditional security mechanisms do not work well. Many security sc...
Wenjia Li, James Parker, Anupam Joshi
ICC
2007
IEEE
117views Communications» more  ICC 2007»
15 years 8 months ago
Modeling Hop Length Distributions for Reactive Routing Protocols in One Dimensional MANETs
— In mobile ad hoc networks (MANETs), packets hop from a source to a series of forwarding nodes until they reach the desired destination. Defining the hop length to be the dista...
Chuan Heng Foh, Juki Wirawan Tantra, Jianfei Cai, ...