Sciweavers

128 search results - page 13 / 26
» Formal Modeling of BeeAdHoc: A Bio-inspired Mobile Ad Hoc Ne...
Sort
View
JNW
2006
149views more  JNW 2006»
13 years 7 months ago
Authenticated AODV Routing Protocol Using One-Time Signature and Transitive Signature Schemes
Mobile ad hoc network (MANET) has been generally regarded as an ideal network model for group communications because of its specialty of instant establishment. However, the securit...
Shidi Xu, Yi Mu, Willy Susilo
ITCC
2005
IEEE
14 years 1 months ago
Simulation of Mobility and Routing in Ad Hoc Networks using Ant Colony Algorithms
Mobile Ad-hoc Networks (MANET’s) have recently attracted a lot of attention in the research community as well as the industry. This technology has become increasingly important ...
Tarek H. Ahmed
PADS
2004
ACM
14 years 28 days ago
Simulation Validation Using Direct Execution of Wireless Ad-Hoc Routing Protocols
Computer simulation is the most common approach to studying wireless ad-hoc routing algorithms. The results, however, are only as good as the models the simulation uses. One shoul...
Jason Liu, Yougu Yuan, David M. Nicol, Robert S. G...
CN
2008
118views more  CN 2008»
13 years 7 months ago
Modeling and computing throughput capacity of wireless multihop networks
Capacity is an important property for QoS support in Mobile Ad Hoc Networks (MANETs) and has been extensively studied. However, most approaches rely on simplified models (e.g., pr...
Patrick Stuedi, Gustavo Alonso
RAID
2004
Springer
14 years 25 days ago
Attack Analysis and Detection for Ad Hoc Routing Protocols
Abstract. Attack analysis is a challenging problem, especially in emerging environments where there are few known attack cases. One such new environment is the Mobile Ad hoc Networ...
Yi-an Huang, Wenke Lee