In self-organizing ad hoc networks, all the networking functions rely on the contribution of the participants. As a basic example, nodes have to forward packets for each other in order to …
S Zhong, L Li, YG Liu, Y Yang - Proceedings of the 11th annual …, 2005 - dl.acm.org
In many applications, wireless ad-hoc networks are formed by devices belonging to independent users. Therefore, a challenging problem is how to provide incentives to …
A Agah, SK Das, K Basu, M Asadi - Third IEEE International …, 2004 - ieeexplore.ieee.org
Insufficiency of memory and battery power of sensors makes the security of sensor networks a hard task to do. This insufficiency also makes applying the existing methods of securing …
A Agah, SK Das - Int. J. Netw. Secur., 2007 - Citeseer
In this paper we formulate the prevention of Denial of Service (DoS) attacks in wireless sensor networks as a repeated game between an intrusion detector and nodes of a sensor …
Presenting a balance of theory and practice, this up-to-date guide provides a comprehensive overview of the key issues in telecommunication network economics, as well …
This literature study presents an overview of underwater acoustic networking. It provides a background and describes the state of the art of all networking facets that are relevant for …
The proper functioning of mobile ad hoc networks depends on the hypothesis that each individual node is ready to forward packets for others. This common assumption, however …
AG Landge, V Pascucci, A Gyulassy… - SC'14: Proceedings …, 2014 - ieeexplore.ieee.org
The ever increasing amount of data generated by scientific simulations coupled with system I/O constraints are fueling a need for in-situ analysis techniques. Of particular interest are …
G Koltsidas, FN Pavlidou - Telecommunication Systems, 2011 - Springer
Game theory has been used for decades in fields of science such as economics and biology, but recently it was used to model routing and packet forwarding in wireless ad-hoc …