Sciweavers

182 search results - page 3 / 37
» Cryptographic techniques for mobile ad-hoc networks
Sort
View
AINTEC
2006
Springer
13 years 11 months ago
Proactive Resilience to Dropping Nodes in Mobile Ad Hoc Networks
Abstract. Proactive routing protocols for mobile ad hoc networks currently offer few mechanisms to detect and/or counter malevolent nodes. Stability and performance of most, if not...
Ignacy Gawedzki, Khaldoun Al Agha
COMSUR
2008
110views more  COMSUR 2008»
13 years 7 months ago
Service discovery for mobile ad hoc networks: A survey of issues and techniques
This paper surveys research in service advertising, discovery and selection for mobile ad hoc networks (MANETs) and related issues. We include a categorization of service discovery...
Christopher N. Ververidis, George C. Polyzos
MOBIHOC
2003
ACM
14 years 7 months ago
SHORT: self-healing and optimizing routing techniques for mobile ad hoc networks
On demand routing protocols provide scalable and costeffective solutions for packet routing in mobile wireless ad hoc networks. The paths generated by these protocols may deviate ...
Chao Gui, Prasant Mohapatra
COORDINATION
2007
Springer
14 years 1 months ago
A Calculus for Mobile Ad Hoc Networks
We suggest a Calculus for Mobile Ad Hoc Networks, CMAN. A node in a network is a processes equipped with a location, it may communicate with other nodes using synchronous local bro...
Jens Chr. Godskesen