Sciweavers

261 search results - page 23 / 53
» An implementation framework for trajectory-based routing in ...
Sort
View
PERCOM
2008
ACM
14 years 7 months ago
SGR: A Shared Generic Routing Support for Ad Hoc Ubiquitous Computing Environments
One of the most evident characteristics of an ad hoc ubiquitous computing environment is the dynamism of connections. Due to the mobility of nodes, paths between communicating pee...
Yangwoo Ko, Dongman Lee
APNOMS
2006
Springer
13 years 11 months ago
Path Hopping Based on Reverse AODV for Security
In Ad hoc networks, malicious nodes can enter in radio transmission range on the routing path and disrupt network activity. Therefore, protecting from intrusion of malicious node a...
Elmurod Talipov, Donxue Jin, JaeYoun Jung, Ilkhyu ...
PADS
2004
ACM
14 years 1 months ago
Simulation Validation Using Direct Execution of Wireless Ad-Hoc Routing Protocols
Computer simulation is the most common approach to studying wireless ad-hoc routing algorithms. The results, however, are only as good as the models the simulation uses. One shoul...
Jason Liu, Yougu Yuan, David M. Nicol, Robert S. G...
CIA
2007
Springer
14 years 1 months ago
From Local Search to Global Behavior: Ad Hoc Network Example
We introduce the Consensual N-Player Prisoner’s Dilemma as a large-scale dilemma. We then present a framework for cooperative consensus formation in large-scale MAS under the N-P...
Osher Yadgar
INFOCOM
2008
IEEE
14 years 2 months ago
Throughput Anonymity Trade-off in Wireless Networks under Latency Constraints
—Providing anonymity to routes in a wireless ad hoc network from passive eavesdroppers is considered. Using Shannon’s equivocation as an information theoretic measure of anonym...
Parvathinathan Venkitasubramaniam, Lang Tong