Sciweavers

804 search results - page 89 / 161
» Limited flooding protocol for mobile ad hoc networks
Sort
View
IPPS
2006
IEEE
14 years 2 months ago
Comparative study of price-based resource allocation algorithms for ad hoc networks
As mobile ad hoc networks provide a wide range of possibly critical services, providing quality of service guarantees becomes an essential element. Yet there is a limited understa...
Marcel Lüthi, Simin Nadjm-Tehrani, Calin Cure...
FCSC
2008
104views more  FCSC 2008»
13 years 8 months ago
On automatic verification of self-stabilizing population protocols
The population protocol model [2] has emerged as an elegant computation paradigm for describing mobile ad hoc networks, consisting of a number of mobile nodes that interact with e...
Jun Pang, Zhengqin Luo, Yuxin Deng
SECPERU
2006
IEEE
14 years 2 months ago
Detecting Critical Nodes for MANET Intrusion Detection Systems
Ad hoc routing protocols have been designed to efficiently reroute traffic when confronted with network congestion, faulty nodes, and dynamically changing topologies. The common d...
A. Karygiannis, E. Antonakakis, A. Apostolopoulos
WS
2005
ACM
14 years 2 months ago
Fully self-organized peer-to-peer key management for mobile ad hoc networks
Mobile ad hoc networks (MANETs) offer communication over a shared wireless channel without any pre-existing infrastructure. Forming peer-to-peer security associations in MANETs i...
Johann van der Merwe, Dawoud S. Dawoud, Stephen Mc...
ICC
2000
IEEE
233views Communications» more  ICC 2000»
14 years 11 days ago
Multicasting Sustained CBR and VBR Traffic in Wireless Ad-Hoc Networks
Wireless ad-hoc networks consist of mobile nodes forming a dynamically changing topology without any infrastructure. Multicasting in a wireless ad-hoc network is difficult and chal...
George D. Kondylis, Srikanth V. Krishnamurthy, Son...