نتایج جستجو برای: routing misbehavior
تعداد نتایج: 54648 فیلتر نتایج به سال:
This study examined how classroom management practices—care and behavioral control—were differentially associated with students’ engagement, misbehavior, and satisfaction with school, using a large representative sample of 3196 Grade 9 students from 117 classes in Singapore. Results of hierarchical linear modeling showed differential relations. After controlling for students’ gender and socioec...
mobile-ad-hoc-networks (manets) are self-configuring networks of mobile nodes, which communicate through wireless links. the infrastructure of a mobile ad hoc network (manet) has no routers for routing, and all nodes must share the same routing protocol to assist each other when transmitting messages. the main issues in manets include the mobility of the network nodes, the scarcity of computati...
A self-contained connection of wireless links that functions without any infrastructure is known as Mobile Ad Hoc Network (MANET). MANET’s nodes could engage actively and dynamically with one another. However, MANETs, from the other side, are exposed to severe potential threats difficult counter present security methods. As a result, several safe communication protocols designed enhance secure ...
Mobile ad-hoc network is a collection of dynamically organized nodes where each node acts as host and router. networks are characterized by the lack preexisting infrastructures or centralized administration. So, they vulnerable to several types attacks, especially Blackhole attack. This attack one most serious attacks in this kind mobile networks. In type attack, malicious sends false answer in...
This paper presents a work in progress which deals with the important and unresolved problem of node misbehavior. A realistic approach is used to determine the impact of contention window manipulation on IEEE 802.11e ad-hoc networks. It is explained why such networks are more prone to misbehavior. Novel results pertaining to the 802.11e standard are presented. Simulation analysis is done for se...
Data trustworthiness is a crucial issue in real-world participatory sensing applications. Without considering this issue, different types of worker misbehavior, especially the challenging collusion attacks, can result in biased and inaccurate estimation and decision making. In this paper, we propose a novel trust-based mixture of Gaussian processes (GP) model for spatial regression to jointly d...
We consider the problem of selfish misbehavior in the optimal cross-layered rate control mechanism of wireless networks. Rate control algorithms of wireless networks are designed under the assumption that network hosts will follow the algorithm specifications. In this paper, we explain a scenario in which a selfish user achieves extra throughput by misleading the scheduling component of the net...
In Mobile ad-hoc networks, nodes must cooperate to achieve the routing functions. Node misbehavior due to selfish or malicious intention could significantly degrade the performance of MANET because most existing routing protocols in MANET are aiming at finding the most efficient path. A Two node-disjoint Routes scheme for Isolating Dropper Node (TRIDNT) protocol has been proposed in [13]. The p...
Title of dissertation Using Internet Geometry to Improve End-to-End Communication Performance Cristian Lumezanu, Doctor of Philosophy, 2009 Directed by Professor Neil Spring Department of Computer Science The Internet has been designed as a best-effort communication medium between its users, providing connectivity but optimizing little else. It does not guarantee good paths between two users: p...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید