Sciweavers

1469 search results - page 190 / 294
» Cooperation in Wireless Ad Hoc Networks
Sort
View
JNW
2008
101views more  JNW 2008»
13 years 9 months ago
Computational Time-Division and Code-Division Channel Access Scheduling in Ad Hoc Networks
Using two-hop neighborhood information, we present the hybrid activation multiple access (HAMA) protocol for time-division channel access scheduling in ad hoc networks with omni-di...
Lichun Bao, J. J. Garcia-Luna-Aceves
INFOCOM
2010
IEEE
13 years 7 months ago
On the Age of Pseudonyms in Mobile Ad Hoc Networks
—In many envisioned mobile ad hoc networks, nodes are expected to periodically beacon to advertise their presence. In this way, they can receive messages addressed to them or par...
Julien Freudiger, Mohammad Hossein Manshaei, Jean-...
JNCA
2008
154views more  JNCA 2008»
13 years 9 months ago
Novel route maintenance protocols for the Bluetooth ad hoc network with mobility
Bluetooth technology is specially designed for the wireless personal area networks to replace cable. Several challenges exist in Bluetooth scatternet formation and routing, since ...
Prasan Kumar Sahoo, Chih-Yung Chang, Sheng-Wen Cha...
INFOCOM
2010
IEEE
13 years 7 months ago
On Delay Constrained Multicast Capacity of Large-Scale Mobile Ad-Hoc Networks
—This paper studies the delay constrained multicast capacity of large scale mobile ad hoc networks (MANETs). We consider a MANET that consists of ns multicast sessions. Each mult...
Shan Zhou, Lei Ying
PERCOM
2005
ACM
14 years 9 months ago
Secure Routing and Intrusion Detection in Ad Hoc Networks
Numerous schemes have been proposed for secure routing protocols, and Intrusion Detection and Response Systems, for ad hoc networks. In this paper, we present a proof-of-concept i...
Anand Patwardhan, Jim Parker, Anupam Joshi, Michae...