Sciweavers

221 search results - page 26 / 45
» Ad hoc broadcast encryption
Sort
View
INFOCOM
2006
IEEE
14 years 3 months ago
Efficient Flooding Scheme Based on 1-Hop Information in Mobile Ad Hoc Networks
—Flooding is one of the most fundamental operations in mobile ad hoc networks. Traditional implementation of flooding suffers from the problems of excessive redundancy of message...
Hai Liu, Peng-Jun Wan, Xiaohua Jia, Xinxin Liu, F....
QSHINE
2005
IEEE
14 years 3 months ago
On Increasing End-to-End Throughput in Wireless Ad Hoc Networks
One of the main characteristics of wireless ad hoc networks is their node-centric broadcast nature of communication, leading to interferences and spatial contention between adjace...
Zongpeng Li, Baochun Li
ICC
2009
IEEE
136views Communications» more  ICC 2009»
14 years 4 months ago
Fast Connected Dominating Set Construction in Mobile Ad Hoc Networks
—The connected dominating set (CDS) has been commonly used for routing and broadcast in mobile ad hoc networks (MANETs). Considering the applications of MANETs, it is generally p...
Kazuya Sakai, Min-Te Sun, Wei-Shinn Ku
UIC
2007
Springer
14 years 3 months ago
Mobility Tracking for Mobile Ad Hoc Networks
In mobile ad hoc networks (MANETs), nodes mobility cause network topologies to change dynamically over time, which complicates important tasks such as broadcasting and routing. Mob...
Hui Xu, Min Meng, Jinsung Cho, Brian J. d'Auriol, ...
IWCMC
2009
ACM
14 years 4 months ago
Probabilistic counter-based route discovery for mobile ad hoc networks
Conventional on-demand route discovery for ad hoc routing protocols extensively use simple flooding, which could potentially lead to high channel contention, causing redundant ret...
Aminu Mohammed, Mohamed Ould-Khaoua, Lewis M. Mack...