Notice of Violation of IEEE Publication Principles: A MAC Aware Cross-Layer Routing Approach for Wireless Mesh Network

L Jiang, G Feng - 2006 International Conference on Wireless …, 2006 - ieeexplore.ieee.org
… In [3] and [4], authors propose new interesting metrics for mesh and ad hoc networks. In
the first work, Expected Transmission Time (ETT) metric is proposed. ETT relies on bandwidth …

Ad hoc QoS on-demand routing (AQOR) in mobile ad hoc networks

Q Xue, A Ganz - Journal of parallel and distributed computing, 2003 - Elsevier
violation detection and (6) fast and efficient route recovery. We propose a novel ad hoc routing
protocol, named Ad hoc … We notice that the ratio of late packet in all 10 flows scenarios, in …

[引用][C] Notice of Violation of IEEE Publication Principles: Attack on RADIUS authentication protocol

P Zhao, X Cao, P Luo - International Conference on …, 2003 - ieeexplore.ieee.org
… The Response Authenticator is essentially an ad hoc MD5 based keyed hash. This
primitive facilitates an attack on the shared secret. If an attacker observes a valid AccessRequest …

Ad hoc plea bargaining

JA Colquitt - Tul. L. Rev., 2000 - HeinOnline
… This ad hoc process permeates the practice today. Judge Colquitt exposes the controversial…
and argues that many of these deals violate current procedural and substantive laws. The …

Intrusion detection in wireless ad-hoc networks

Y Zhang, W Lee - Proceedings of the 6th annual international …, 2000 - dl.acm.org
… is essential to a wireless ad-hoc network because it allows … advantage and that copies bear
this notice and the full citation on the … We can use the "confidence" of the violated rule as the "…

ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks

B Awerbuch, R Curtmola, D Holmer… - ACM Transactions on …, 2008 - dl.acm.org
… commercial advantage and that copies show this notice on the first page or initial screen of
a … The protocol operates in the non-probing state until a loss threshold violation occurs and a …

Autonomous Real‐Time Speed‐Limit Violation Detection and Reporting Systems Based on the Internet of Vehicles (IoV)

SA Elsagheer Mohamed, MT Parvez… - Journal of advanced …, 2021 - Wiley Online Library
… traffic violation detection techniques, the ad hoc networking, the Vehicular Ad Hoc Network,
… information using image processing and then notify the driver about the extracted information…

Current Developments at the Ad Hoc International Criminal Tribunals

DA Mundis, F Gaynor - Journal of International Criminal Justice, 2005 - academic.oup.com
… of the Judges may be noticed. The views expressed herein … against humanity, murder as a
violation of the laws or customs … against humanity, murder as a violation of the laws or customs …

Security in wireless ad-hoc networks–a survey

R Di Pietro, S Guarino, NV Verde… - Computer …, 2014 - Elsevier
… In practice, nodes near the border of a jammed region notify their … nodes recover and notify
this change to their neighbors. … Data integrity is violated when the adversary corrupts records, …

[PDF][PDF] Security in ad hoc networks

V Karpijoki - Proceedings of the Helsinki University of Technology …, 2000 - scss.tcd.ie
… In addition, as ad hoc networks are often designed for specific environments and may have
… over papers on ad hoc networking shows that many of the new generation ad hoc networking …