Sciweavers

102 search results - page 9 / 21
» Effective Intrusion Detection Using Multiple Sensors in Wire...
Sort
View
WOWMOM
2006
ACM
135views Multimedia» more  WOWMOM 2006»
14 years 2 months ago
A MAC Layer Protocol for Priority-based Reliable Multicast in Wireless Ad Hoc Networks
RTS-CTS handshake based protocols achieve “reliable unicast” by eliminating the hidden node problem effectively, however, these solutions are not directly or efficiently gene...
Murat Demirbas, Muzammil Hussain
IAJIT
2007
150views more  IAJIT 2007»
13 years 8 months ago
Fuzzy Active Queue Management for Congestion Control in Wireless Ad-Hoc
: Mobile ad-hoc network is a network without infrastructure where every node has its own protocols and services for powerful cooperation in the network. Every node also has the abi...
Essam Natsheh, Adznan B. Jantan, Sabira Khatun, Su...
ICNP
2005
IEEE
14 years 2 months ago
The Fundamental Role of Hop Distance in IEEE802.11 Multi-Hop Ad Hoc Networks
In wireless networks, it is well understood what throughput can be achieved by nodes who can hear each other (i.e. nodes within a single cell)[1, 3]. The effects of nodes beyond t...
Yan Gao, Dah-Ming Chiu, John C. S. Lui
WOWMOM
2005
ACM
119views Multimedia» more  WOWMOM 2005»
14 years 2 months ago
Exploiting Path Diversity in the Link Layer in Wireless Ad Hoc Networks
— We develop an anycast mechanism at the link layer for wireless ad hoc networks. The goal is to exploit path diversity in the link layer by choosing the best next hop to forward...
Shweta Jain, Samir R. Das
TMC
2008
134views more  TMC 2008»
13 years 8 months ago
A Hybrid Token-CDMA MAC Protocol for Wireless Ad Hoc Networks
Token passing medium access control (MAC) protocols are gaining interest amongst wireless ad hoc network researchers as they provide unrivalled advantages over the existing IEEE 80...
I-Sheng Liu, Fambirai Takawira, Hong-Jun Xu