Sciweavers

221 search results - page 20 / 45
» Ad hoc broadcast encryption
Sort
View
COMCOM
2006
123views more  COMCOM 2006»
13 years 9 months ago
Modeling the performance of flooding in wireless multi-hop Ad hoc networks
One feature common to most existing routing protocols for wireless mobile ad hoc networks, or MANETs, is the need to flood control messages network-wide during the route acquisiti...
Kumar Viswanath, Katia Obraczka
DIALM
1999
ACM
98views Algorithms» more  DIALM 1999»
14 years 2 months ago
Routing with guaranteed delivery in ad hoc wireless networks
We consider routing problems in ad hoc wireless networks modeled as unit graphs in which nodes are points in the plane and two nodes can communicate if the distance between them is...
Prosenjit Bose, Pat Morin, Ivan Stojmenovic, Jorge...
ICCNMC
2005
Springer
14 years 3 months ago
A Prediction-Based Location Update Algorithm in Wireless Mobile Ad-Hoc Networks
Location information in Mobile Ad Hoc Networks (MANETs) provides efficiency to uni-cast and multi-cast algorithms. This paper proposes a new location update algorithm called PLU. T...
Jun Shen, Kun Yang, Shaochun Zhong
GLOBECOM
2009
IEEE
14 years 4 months ago
Hole Reshaping Routing in Large-Scale Mobile Ad-Hoc Networks
—Mobile ad-hoc networks (MANETs) usually contain sparse or even empty regions called holes. The local optimum problem will occur when routing packets meet holes in the network. I...
Peiqiang Li, Guojun Wang, Jie Wu, Hong-Chuan Yang
GLOBECOM
2009
IEEE
14 years 4 months ago
A Distributed Constraint Satisfaction Problem for Virtual Device Composition in Mobile Ad Hoc Networks
— The dynamic composition of systems of networked appliances, or virtual devices, enables users to generate complex strong specific systems. Current prominent MANET-based composi...
Eric Karmouch, Amiya Nayak