Sciweavers

477 search results - page 56 / 96
» Information-Theoretic Bounds for Mobile Ad-hoc Networks Rout...
Sort
View
ADHOCNOW
2008
Springer
14 years 2 months ago
Distributed Monitoring in Ad Hoc Networks: Conformance and Security Checking
Ad hoc networks are exposed more than traditional networks to security threats due to their mobility and open architecture aspects. In addition, any dysfunction due to badly congu...
Wissam Mallouli, Bachar Wehbi, Ana R. Cavalli
AINA
2005
IEEE
14 years 2 months ago
Global Connectivity for Mobile IPv6-Based Ad Hoc Networks
The IPv6-enabled network architecture has recently attracted much attention. In this paper, we address the issue of connecting MANETs to global IPv6 networks while supporting IPv6...
Chiung-Ying Wang, Cheng-Ying Li, Ren-Hung Hwang, Y...
WCNC
2008
IEEE
14 years 2 months ago
Performance Evaluation of Vehicular DTN Routing under Realistic Mobility Models
—In performance studies of vehicular ad hoc networks (VANETs), the underlying mobility model plays an important role. Since conventional mobile ad hoc network (MANET) routing pro...
Pei'en Luo, Hongyu Huang, Wei Shu, Minglu Li, Min-...
COMCOM
2006
123views more  COMCOM 2006»
13 years 8 months ago
Modeling the performance of flooding in wireless multi-hop Ad hoc networks
One feature common to most existing routing protocols for wireless mobile ad hoc networks, or MANETs, is the need to flood control messages network-wide during the route acquisiti...
Kumar Viswanath, Katia Obraczka
BROADNETS
2006
IEEE
14 years 2 months ago
How to Specify and How to Prove Correctness of Secure Routing Protocols for MANET
Secure routing protocols for mobile ad hoc networks have been developed recently, yet, it has been unclear what are the properties they achieve, as a formal analysis of these prot...
Panagiotis Papadimitratos, Zygmunt J. Haas, Jean-P...