Sciweavers

333 search results - page 22 / 67
» An optimized authentication protocol for mobile network reco...
Sort
View
WMASH
2005
ACM
14 years 2 months ago
An implementation and evaluation of a mobile hotspot
The unprecedented proliferation of wireless networking services and products has taken the notion of hotspots a step further to accommodate “mobile hotspots”. The deployment o...
Eranga Perera, Henrik Petander, Kun-Chan Lan, Arun...
MOBIHOC
2003
ACM
14 years 8 months ago
SHORT: self-healing and optimizing routing techniques for mobile ad hoc networks
On demand routing protocols provide scalable and costeffective solutions for packet routing in mobile wireless ad hoc networks. The paths generated by these protocols may deviate ...
Chao Gui, Prasant Mohapatra
ICDCSW
2003
IEEE
14 years 1 months ago
Foundations of Security for Hash Chains in Ad Hoc Networks
Nodes in ad hoc networks generally transmit data at regular intervals over long periods of time. Recently, ad hoc network nodes have been built that run on little power and have v...
Phillip G. Bradford, Olga V. Gavrylyako
INFOCOM
2007
IEEE
14 years 2 months ago
Self-Adaptive On Demand Geographic Routing Protocols for Mobile Ad-hoc Networks
— It has been a big challenge to develop routing protocol that can meet different application needs and optimize routing paths according to the topology change in mobile ad hoc n...
X. Xiang, Z. Zhou, X. Wang
ANTSW
2008
Springer
13 years 10 months ago
Formal Modeling of BeeAdHoc: A Bio-inspired Mobile Ad Hoc Network Routing Protocol
Design and development of routing protocols for Mobile Ad Hoc Networks (MANETs) is an active area of research. The standard practice among researchers working in this emerging doma...
Muhammad Saleem, Syed Ali Khayam, Muddassar Farooq