Sciweavers

2634 search results - page 490 / 527
» Infrastructured Ad Hoc Networks
Sort
View
ICN
2009
Springer
13 years 7 months ago
Design and Validation of an Analytical Model to Evaluate Monitoring Frameworks Limits
It is essential that a monitoring system is being designed with performance and scalability in mind. But due to the diversity and complexity of both the monitoring and the monitore...
Abdelkader Lahmadi, Laurent Andrey, Olivier Festor
CORR
2011
Springer
170views Education» more  CORR 2011»
13 years 4 months ago
Performance Comparison and Analysis of Preemptive-DSR and TORA
The Dynamic Source Routing protocol (DSR) is a simple and efficient routing protocol designed specifically for use in multi-hop wireless ad hoc networks of mobile nodes. Preemptiv...
V. Ramesh, P. Subbaiah, N. Koteswar Rao, N. Subhas...
IJNSEC
2011
77views more  IJNSEC 2011»
13 years 4 months ago
Performance Evaluation of the TSS Node Authentication Scheme in Noisy MANETs
This paper presents a description and performance evaluation of a threshold secret sharing (TSS) node authentication scheme in noisy mobile ad hoc networks (MANETs). The scheme ca...
Hussein Al-Bahadili, Shakir Hussain, Ghassan Issa,...
HICSS
2003
IEEE
129views Biometrics» more  HICSS 2003»
14 years 3 months ago
Experimental Studies and Modeling of an Information Embedded Power System
This paper develops a model of an electrical power system, with its inherent embedded communication system, for the purpose of studying the characteristics of power system measure...
Stephen P. Carullo, Chika Nwankpa
MOBIHOC
2008
ACM
14 years 9 months ago
An O(log n) dominating set protocol for wireless ad-hoc networks under the physical interference model
Dealing with interference is one of the primary challenges to solve in the design of protocols for wireless ad-hoc networks. Most of the work in the literature assumes localized o...
Christian Scheideler, Andréa W. Richa, Paol...