Sciweavers

954 search results - page 56 / 191
» Application Performance Assessment on Wireless Ad Hoc Networ...
Sort
View
INFOCOM
2008
IEEE
14 years 3 months ago
Throughput Anonymity Trade-off in Wireless Networks under Latency Constraints
—Providing anonymity to routes in a wireless ad hoc network from passive eavesdroppers is considered. Using Shannon’s equivocation as an information theoretic measure of anonym...
Parvathinathan Venkitasubramaniam, Lang Tong
TON
2008
136views more  TON 2008»
13 years 8 months ago
Density-based anycast: a robust routing strategy for wireless ad hoc networks
Abstract--Existing anycast routing protocols solely route packets to the closest group member. In this paper, we introduce density-based anycast routing, a new anycast routing para...
Vincent Lenders, Martin May, Bernhard Plattner
ICWN
2003
13 years 10 months ago
Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks
Mobile ad hoc networks (MANETs) are extensively used in military and civilian applications. The dynamic topology of MANETs allows nodes to join and leave the network at any point ...
Sanjay Ramaswamy, Huirong Fu, Manohar Sreekantarad...
MSWIM
2003
ACM
14 years 2 months ago
Simulation of large ad hoc networks
An ad hoc network is formed by wireless mobile nodes (hosts) that operate as terminals as well as routers in the network, without any centralized administration. Research in ad ho...
Valeriy Naoumov, Thomas R. Gross
GLOBECOM
2007
IEEE
14 years 3 months ago
A Busy-Tone Based MAC Scheme for Wireless Ad Hoc Networks Using Directional Antennas
— Applying directional antennas in wireless ad hoc networks offers numerous benefits, such as extended communication range, increased spatial reuse, improved capacity and suppre...
Hongning Dai, Kam-Wing Ng, Min-You Wu