Sciweavers

727 search results - page 39 / 146
» Formulas and Protocols for Broadcasting in Mobile Ad Hoc Net...
Sort
View
ADHOCNOW
2004
Springer
14 years 25 days ago
Weathering the Storm: Managing Redundancy and Security in Ad Hoc Networks
Many ad hoc routing algorithms rely on broadcast flooding for location discovery or more generally for secure routing applications, particularly when dealing with Byzantine threat...
Mike Burmester, Tri Van Le, Alec Yasinsac
PEWASUN
2004
ACM
14 years 25 days ago
A routing protocol for power constrained networks with asymmetric links
In many instances, an ad hoc network consists of nodes with different hardware and software capabilities as well as power limitations. This is the case of ad hoc grids where devi...
Guoqiang Wang, Yongchang Ji, Dan C. Marinescu, Dam...
ACSD
2010
IEEE
220views Hardware» more  ACSD 2010»
13 years 5 months ago
Towards Performance Evaluation of Mobile Ad Hoc Network Protocols
We present a formal framework to evaluate stochastic properties of MANET protocols. It captures the interplay between stochastic behavior of protocols deployed at different network...
Fatemeh Ghassemi, Ali Movaghar, Wan Fokkink
WCNC
2008
IEEE
14 years 1 months ago
A Secure Routing Protocol in Proactive Security Approach for Mobile Ad-Hoc Networks
—Secure routing of Mobile Ad-hoc Networks (MANETs) is still a hard problem after years of research. We therefore propose to design a secure routing protocol in a new approach. Th...
Shushan Zhao, Akshai K. Aggarwal, Shuping Liu, Hua...
BIOWIRE
2007
Springer
14 years 1 months ago
Epcast: Controlled Dissemination in Human-Based Wireless Networks Using Epidemic Spreading Models
Epidemics-inspired techniques have received huge attention in recent years from the distributed systems and networking communities. These algorithms and protocols rely on probabili...
Salvatore Scellato, Cecilia Mascolo, Mirco Musoles...