Sciweavers

182 search results - page 23 / 37
» Cryptographic techniques for mobile ad-hoc networks
Sort
View
QSHINE
2005
IEEE
14 years 3 months ago
Cooperative-Diversity Slotted ALOHA
We propose a cooperative-diversity technique for ad hoc networks based on the decode-and-forward relaying strategy. We develop a MAC protocol based on slotted ALOHA that allows ne...
Wing-Hin Wong, John M. Shea, Tan F. Wong
RTAS
2005
IEEE
14 years 3 months ago
Convoy Driving through Ad-Hoc Coalition Formation
— Convoy driving on public highways is a useful phenomena which increases the safety and the throughput of the highway. We present an approach through which a wireless Convoy Dri...
Majid Ali Khan, Ladislau Bölöni
SIGMETRICS
2005
ACM
104views Hardware» more  SIGMETRICS 2005»
14 years 3 months ago
Message delay in MANET
A generic stochastic model with only two input parameters is introduced to evaluate the message delay in mobile ad hoc networks (MANETs) where nodes may relay messages. The Laplac...
Robin Groenevelt, Philippe Nain, Ger Koole
CORR
2010
Springer
139views Education» more  CORR 2010»
13 years 10 months ago
A Low Overhead Reachability Guaranteed Dynamic Route Discovery Mechanism for Dense MANETs
A crucial issue for a mobile ad hoc network is the handling of a large number of nodes. As more nodes join the mobile ad hoc network, contention and congestion are more likely. Th...
Sharmila Sankar, V. Sankaranarayanan
INFOSCALE
2006
ACM
14 years 3 months ago
A predictive approach to achieving consistency in cooperative caching in MANET
Cooperative caching is a very important technique for efficient data dissemination and sharing in mobile ad hoc networks (MANETs). Many applications have requirements on the consi...
Yu Huang 0002, Jiannong Cao, Beihong Jin