Sciweavers

197 search results - page 31 / 40
» Buckshot Routing - A Robust Source Routing Protocol for Dens...
Sort
View
SASN
2006
ACM
14 years 1 months ago
Impact of optimal MAC layer attacks on the network layer
Node misbehavior in wireless ad hoc networks leads to sudden unpredictable changes in network topology, resulting in fluctuation of traffic load and capacity for already existin...
Svetlana Radosavac, John S. Baras, George V. Moust...
TMC
2008
83views more  TMC 2008»
13 years 7 months ago
A Swarm-Intelligence-Based Protocol for Data Acquisition in Networks with Mobile Sinks
This paper addresses the problem of data acquisition in ad hoc and sensor networks with mobile sinks and proposes a protocol based on swarm intelligence, SIMPLE, to route data in s...
Hua Yang, Fengji Ye, Biplab Sikdar
PERCOM
2010
ACM
13 years 6 months ago
HERO: Hybrid Emergency Route-Opening Protocol
—This paper presents an ad-hoc vehicular protocol to support the logistics of first responders. First responders often travel several kilometers to reach an area impacted by an ...
Jonathan Woodbridge, Mars Lan, Giovanni Pau, Mario...
VTC
2010
IEEE
148views Communications» more  VTC 2010»
13 years 6 months ago
Delay-Tolerant Cooperative Diversity Routing MANET
—Some mobile ad hoc networks (MANETs) such as inter-vehicle communications require a transmission scheme that is robust to mobility and asynchronous reception with low setup over...
Tian Peng Ren, Yong Liang Guan, Chau Yuen, Rong Ju...
ICCS
2007
Springer
14 years 1 months ago
Securely Deliver Data by Multi-path Routing Scheme in Wireless Mesh Networks
Wireless Mesh Networks with static Transit Access Points (TAPs) have many advantages to connect different kinds of networks. While Mobile Ad hoc Networks still have many challenges...
Cao Trong Hieu, Choong Seon Hong