Sciweavers

558 search results - page 41 / 112
» A Stability-Based Clustering Technique and Routing Protocol ...
Sort
View
ICPPW
2002
IEEE
14 years 17 days ago
Infrastructured Ad Hoc Networks
In traditional ad hoc networks, all nodes are considered equal and take equal part in the routing and forwarding of packets. We believe that this may not always be desirable. Rath...
Anders Lindgren, Olov Schelén
HASE
2007
IEEE
13 years 11 months ago
Development of Custom Selling System Using Ad Hoc Networks
Recently, many routing protocols and applications for mobile ad hoc networks have been proposed. However, most of them are tested through the simulation experiments, but are not d...
Masato Asada, Tomoyuki Ohta, Kenji Ishida, Yoshiak...
CORR
2010
Springer
99views Education» more  CORR 2010»
13 years 7 months ago
Security Scheme for Distributed DoS in Mobile Ad Hoc Networks
In Mobile Ad hoc Networks (MANET), various types of Denial of Service Attacks (DoS) are possible because of the inherent limitations of its routing protocols. Considering the Ad ho...
Sugata Sanyal, Dhaval Gada, Rajat Gogri, Punit Rat...
ICC
2000
IEEE
144views Communications» more  ICC 2000»
14 years 1 days ago
Fisheye State Routing: A Routing Scheme for Ad Hoc Wireless Networks
– This paper presents a novel routing protocol for wireless ad hoc networks – Fisheye State Routing (FSR). FSR introduces the notion of multi-level fisheye scope to reduce rou...
Guangyu Pei, Mario Gerla, Tsu-Wei Chen
PERCOM
2009
ACM
14 years 8 months ago
Mobile Ad Hoc Networks: the DHT paradigm
In this paper, a DHT-based routing protocol which integrates at the network layer both traditional direct routing, i.e. MANET routing, and indirect key-based routing, i.e. P2P rout...
Marcello Caleffi