Sciweavers

236 search results - page 5 / 48
» adhoc 2005
Sort
View
ADHOC
2005
134views more  ADHOC 2005»
14 years 9 months ago
How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols
This paper presents a systematic analysis of insider attacks against mobile ad-hoc routing protocols, using the Ad hoc On-Demand Distance Vector (AODV) protocol as an example. It ...
Peng Ning, Kun Sun
ISCC
2005
IEEE
104views Communications» more  ISCC 2005»
15 years 3 months ago
Bandwidth Guaranteed Routing for Ad Hoc Networks with Interference Consideration
The problem of computing bandwidth guaranteed paths for given flow requests in an ad-hoc network is complicated because neighboring links share the medium. We define the path wi...
Zhanfeng Jia, Rajarshi Gupta, Jean C. Walrand, Pra...
CLEF
2005
Springer
15 years 3 months ago
Applying Light Natural Language Processing to Ad-Hoc Cross Language Information Retrieval
In the CLEF 2005 Ad-Hoc Track we experimented with language-specific morphosyntactic processing and light Natural Language Processing (NLP) for the retrieval of Bulgarian, French,...
Christina Lioma, Craig Macdonald, Ben He, Vassilis...
ADHOCNOW
2005
Springer
15 years 3 months ago
Equilibria for Broadcast Range Assignment Games in Ad-Hoc Networks
Pilu Crescenzi, Miriam Di Ianni, Alessandro Lazzon...