Sciweavers

242 search results - page 18 / 49
» Gateway Selection Review in Ad hoc Networks
Sort
View
ICISC
2009
138views Cryptology» more  ICISC 2009»
13 years 5 months ago
Cryptanalysis of a Message Recognition Protocol by Mashatan and Stinson
At CANS 2008, Mashatan and Stinson suggested a message recognition protocol for ad hoc pervasive networks. The protocol provides a procedure to resynchronize in case of a (possibly...
Madeline González Muñiz, Rainer Stei...
IJWMC
2006
75views more  IJWMC 2006»
13 years 7 months ago
Performance of multichannel wireless ad hoc networks
:ThispaperaddressesthedesignofMediumAccessControl(MAC)protocolsforwireless ad hoc networks that derive benefits from using multiple orthogonal channels for data transmission. Each ...
Asis Nasipuri, Samir Ranjan Das
TWC
2010
13 years 2 months ago
Toward network coding-based protocols for data broadcasting in wireless Ad Hoc networks
In this paper we consider practical dissemination algorithms exploiting network coding for data broadcasting in ad hoc wireless networks. For an efcient design, we analyze issues r...
Alfred Asterjadhi, Elena Fasolo, Michele Rossi, J&...
IPPS
2008
IEEE
14 years 1 months ago
A game theoretical data replication technique for mobile ad hoc networks
Adaptive replication of data items on servers of a mobile ad hoc network can alleviate access delays. The selection of data items and servers requires solving a constrained optimi...
Samee Ullah Khan, Anthony A. Maciejewski, Howard J...
MOBIWAC
2006
ACM
14 years 1 months ago
Ad hoc routing based on the stability of routes
Some reactive ad hoc protocols allow the discovery and/or storage of multiple paths to the same destination node. The selection of the path to utilize is commonly based on the cri...
Alicia Triviño-Cabrera, Irene Nieves-P&eacu...