Sciweavers

671 search results - page 62 / 135
» Fisheye State Routing: A Routing Scheme for Ad Hoc Wireless ...
Sort
View
ACSAC
2004
IEEE
14 years 24 days ago
An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks
Mobile ad hoc network routing protocols are highly susceptible to subversion. Previous research in securing these protocols has typically used techniques based on encryption and r...
Giovanni Vigna, Sumit Gwalani, Kavitha Srinivasan,...
ICC
2007
IEEE
136views Communications» more  ICC 2007»
14 years 3 months ago
Cross-layer Networking for Peer Databases over Wireless Ad-Hoc Communities
— Recent advances in wireless technology as well as in electronics industry have given rise to the widespread of wireless ad-hoc networking. Expanding data-centric applications t...
Evangelos Papapetrou, Efthymia Rova, Apostolos Zar...
WONS
2005
IEEE
14 years 2 months ago
A Partition Prediction Algorithm for Service Replication in Mobile Ad Hoc Networks
Due to the mobility of nodes in Ad hoc networks, network topology is dynamic and unpredictable, which leads to frequent network partitioning. This partitioning disconnects many no...
Abdelouahid Derhab, Nadjib Badache, Abdelmadjid Bo...
EJWCN
2010
119views more  EJWCN 2010»
13 years 3 months ago
Simulations of the Impact of Controlled Mobility for Routing Protocols
This paper addresses mobility control routing in wireless networks. Given a data flow request between a sourcedestination pair, the problem is to move nodes towards the best placem...
Valeria Loscrì, Enrico Natalizio, Carmelo C...
MOBIHOC
2001
ACM
14 years 8 months ago
A comparison of TCP performance over three routing protocols for mobile ad hoc networks
We examine the performance of the TCP protocol for bulkdata transfers in mobile ad hoc networks (MANETs). We vary the number of TCP connections and compare the performances of thr...
Thomas D. Dyer, Rajendra V. Boppana