Sciweavers

804 search results - page 15 / 161
» Limited flooding protocol for mobile ad hoc networks
Sort
View
MOBICOM
2004
ACM
14 years 2 months ago
Revisiting the TTL-based controlled flooding search: optimality and randomization
In this paper we consider the problem of searching for a node or an object (i.e., piece of data, file, etc.) in a large network. Applications of this problem include searching fo...
Nicholas B. Chang, Mingyan Liu
CROSSROADS
2004
108views more  CROSSROADS 2004»
13 years 8 months ago
A distributed security scheme for ad hoc networks
In Mobile Ad hoc Networks (MANET), various types of Denial of Service Attacks (DoS) are possible because of the inherent limitations of its routing protocols. Considering the Ad h...
Dhaval Gada, Rajat Gogri, Punit Rathod, Zalak Dedh...
ESAS
2006
Springer
14 years 7 days ago
Verifiable Agreement: Limits of Non-repudiation in Mobile Peer-to-Peer Ad Hoc Networks
Zinaida Benenson, Felix C. Freiling, Birgit Pfitzm...
ICNP
2002
IEEE
14 years 1 months ago
Design and Implementation of a TCP-Friendly Transport Protocol for Ad Hoc Wireless Networks
Transport protocol design for mobile ad hoc networks is challenging because of unique issues, including mobilityinduced disconnection, reconnection, and high out-of-order delivery...
Zhenghua Fu, Benjamin Greenstein, Xiaoqiao Meng, S...