Sciweavers

688 search results - page 122 / 138
» Fisheye State Routing in Mobile Ad Hoc Networks
Sort
View
WS
2006
ACM
14 years 1 months ago
Modeling Ad-hoc rushing attack in a negligibility-based security framework
In this paper, we propose a formal notion of network security for ad hoc networks. We adopt a probabilistic security framework, that is, security is defined by a polynomially bou...
Jiejun Kong, Xiaoyan Hong, Mario Gerla
APCSAC
2003
IEEE
14 years 28 days ago
A Router Architecture to Achieve Link Rate Throughput in Suburban Ad-hoc Networks
Static nodes, e.g. houses, educational institutions etc, can comprise ad-hoc networks using off-the-self wireless technologies with a view to bypass expensive telecommunication so...
Muhammad Mahmudul Islam, Ronald Pose, Carlo Kopp
ICCSA
2009
Springer
14 years 2 months ago
A Performance Comparison of Swarm Intelligence Inspired Routing Algorithms for MANETs
Swarm Intelligence (SI) inspired routing algorithms have become a research focus in recent years due to their self-organizing nature, which is very suitable to the routing problems...
Jin Wang, Sungyoung Lee
CORR
2008
Springer
107views Education» more  CORR 2008»
13 years 7 months ago
Modeling Spatial and Temporal Dependencies of User Mobility in Wireless Mobile Networks
Abstract--Realistic mobility models are fundamental to evaluate the performance of protocols in mobile ad hoc networks. Unfortunately, there are no mobility models that capture the...
Wei-jen Hsu, Thrasyvoulos Spyropoulos, Konstantino...
MASS
2010
150views Communications» more  MASS 2010»
13 years 5 months ago
A non-replication multicasting scheme in delay tolerant networks
Delay tolerant networks (DTNs) are a special type of wireless mobile networks which may lack continuous network connectivity. Multicast is an important routing function that suppor...
Jie Wu, Yunsheng Wang