Sciweavers

804 search results - page 76 / 161
» Limited flooding protocol for mobile ad hoc networks
Sort
View
HICSS
2005
IEEE
144views Biometrics» more  HICSS 2005»
14 years 2 months ago
Secure Dynamic Source Routing
— In this paper we present the Secure Dynamic Source Routing protocol for Mobile Ad hoc Networks that prevents a lot of potential attacks to these kind of networks. We also prese...
Frank Kargl, Alfred Geiss, Stefan Schlott, Michael...
INFOCOM
2005
IEEE
14 years 2 months ago
Anonymous communications in mobile ad hoc networks
— Due to the broadcast nature of radio transmissions, communications in mobile ad hoc networks (MANETs) are more susceptible to malicious traffic analysis. In this paper we prop...
Yanchao Zhang, Wei Liu, Wenjing Lou
ITCC
2005
IEEE
14 years 2 months ago
Simulation of Mobility and Routing in Ad Hoc Networks using Ant Colony Algorithms
Mobile Ad-hoc Networks (MANET’s) have recently attracted a lot of attention in the research community as well as the industry. This technology has become increasingly important ...
Tarek H. Ahmed
MSWIM
2004
ACM
14 years 2 months ago
Consistency challenges of service discovery in mobile ad hoc networks
Emerging “urban” ad hoc networks resulting from a large number of individual WLAN users challenge the way users could explore and interact with their physical surroundings. Ro...
Christian Frank, Holger Karl
TWC
2008
245views more  TWC 2008»
13 years 8 months ago
Cross-Layer Optimal Policies for Spatial Diversity Relaying in Mobile Ad Hoc Networks
In order to adapt to time-varying wireless channels, various channel-adaptive schemes have been proposed to exploit inherent spatial diversity in mobile/wireless ad hoc networks w...
Jing Ai, Alhussein A. Abouzeid, Zhenzhen Ye