Sciweavers

677 search results - page 65 / 136
» Automatized Verification of Ad Hoc Routing Protocols
Sort
View
HICSS
2005
IEEE
144views Biometrics» more  HICSS 2005»
14 years 2 months ago
Secure Dynamic Source Routing
— In this paper we present the Secure Dynamic Source Routing protocol for Mobile Ad hoc Networks that prevents a lot of potential attacks to these kind of networks. We also prese...
Frank Kargl, Alfred Geiss, Stefan Schlott, Michael...
ICMCS
2005
IEEE
85views Multimedia» more  ICMCS 2005»
14 years 2 months ago
Personally Customizable Group Navigation System Using Cellular Phones and Wireless Ad-Hoc Communication
Due to the progress of portable computing devices such as PDAs, cellular phones and small sized PCs, many personal navigation systems have been developed which navigate their user...
Yoshitaka Nakamura, Guiquan Ren, Masatoshi Nakamur...
ICC
2008
IEEE
166views Communications» more  ICC 2008»
14 years 3 months ago
Multi-Initiator Connected Dominating Set Construction for Mobile Ad Hoc Networks
— The connected dominating set (CDS) has been extensively used for routing and broadcast in mobile ad hoc networks. While existing CDS protocols are successful in constructing CD...
Kazuya Sakai, Fangyang Shen, Kyoung Min Kim, Min-T...
CIT
2004
Springer
14 years 2 months ago
Associativity Based Mobility-Adaptive K-Clustering in Mobile Ad-Hoc Networks
To solve the scalability issue of ad hoc network, a new cluster maintenance protocol is proposed. Clusters may change dynamically, reflecting the mobility of the underlying networ...
Chinnappan Jayakumar, Chenniappan Chellappan
JUCS
2008
138views more  JUCS 2008»
13 years 8 months ago
A Knowledge Discovery Agent for a Topology Bit-map in Ad Hoc Mobile Networks
: A central characteristic of ad hoc mobile networks is the frequent changes of their topology. This is the source of many problems that need to be solved. AODV is an on-demand rou...
SungSoo Lee, HangKon Kim, ChongGun Kim