Sciweavers

477 search results - page 39 / 96
» Information-Theoretic Bounds for Mobile Ad-hoc Networks Rout...
Sort
View
MOBIHOC
2005
ACM
14 years 8 months ago
A secure ad-hoc routing approach using localized self-healing communities
Mobile ad hoc networks (MANETs) are vulnerable to routing attacks, especially attacks launched by non-cooperative (selfish or compromised) network members and appear to be protoco...
Jiejun Kong, Xiaoyan Hong, Yunjung Yi, Joon-Sang P...
IEEECIT
2010
IEEE
13 years 7 months ago
Fuzzy Location Service for Mobile Ad Hoc Networks
Abstract—Over the past years, location-based routing protocols have been studied extensively in mobile ad hoc networks (MANETs). However, how to efficiently provide the location ...
Yongming Xie, Guojun Wang, Jie Wu
WONS
2005
IEEE
14 years 2 months ago
The Pulse Protocol: Mobile Ad hoc Network Performance Evaluation
— We present a performance evaluation of the Pulse protocol operating in a peer-to-peer mobile ad hoc network environment. The Pulse protocol utilizes a periodic flood (the puls...
Baruch Awerbuch, David Holmer, Herbert Rubens
CCR
2002
98views more  CCR 2002»
13 years 8 months ago
Efficient flooding with Passive Clustering (PC) in ad hoc networks
An ad hoc network is a fast deployable selfconfiguring wireless network characterized by node mobility, dynamic topology structure, unreliable media and limited power supply. Node...
Taek Jin Kwon, Mario Gerla
HICSS
2003
IEEE
200views Biometrics» more  HICSS 2003»
14 years 1 months ago
Scatternet Formation of Bluetooth Ad Hoc Networks
Scatternet formation must be addressed before any ad hoc network protocol can be run over Bluetooth. This is due to the frequency hop nature and piconet unit of Bluetooth. In this...
Bin Zhen, Jonghun Park, Yongsuk Kim