Results 271 to 280 of about 248,355 (346)
Energy-efficient distributed constructions of miniumum spanning tree for wireless ad-hoc networks
V S. A. Kumar
openalex +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Security in wireless ad-hoc networks – A survey
Computer Communications, 2014Pervasive mobile and low-end wireless technologies, such as radio-frequency identification (RFID), wireless sensor networks and the impending vehicular ad-hoc networks (VANETs), make the wireless scenario exciting and in full transformation. For all the above (and similar) technologies to fully unleash their potential in the industry and society, there
Roberto Di Pietro +2 more
exaly +3 more sources
Survey on sybil attack defense mechanisms in wireless ad hoc networks
Journal of Network and Computer Applications, 2018Wireless ad hoc networks are vulnerable to Sybil attacks due to the broadcast nature of the wireless medium and an absence of central authority. In a Sybil attack, an adversary illegitimately claims to have multiple imaginary identities, called Sybil ...
Amol Vâsudeva, Manu Sood
exaly +2 more sources
Does the IEEE 802.11 MAC protocol work well in multihop wireless ad hoc networks?
IEEE Communications Magazine, 2001Shugong Xu, T. Saadawi
exaly +2 more sources
Forwarding strategies in named data wireless ad hoc networks: Design and evaluation
Journal of Network and Computer Applications, 2015Marica Amadeo +2 more
exaly +2 more sources
A Survey of Geographical Routing in Wireless Ad-Hoc Networks
IEEE Communications Surveys and Tutorials, 2013Fraser Cadger +2 more
exaly +2 more sources
Optimal resource allocation in wireless ad hoc networks: a price-based approach
IEEE Transactions on Mobile Computing, 2006Baochun Li, Klara Nahrstedt
exaly +2 more sources

