Sciweavers

929 search results - page 118 / 186
» Modeling and Verifying Ad Hoc Routing Protocols
Sort
View
TWC
2008
245views more  TWC 2008»
13 years 7 months ago
Cross-Layer Optimal Policies for Spatial Diversity Relaying in Mobile Ad Hoc Networks
In order to adapt to time-varying wireless channels, various channel-adaptive schemes have been proposed to exploit inherent spatial diversity in mobile/wireless ad hoc networks w...
Jing Ai, Alhussein A. Abouzeid, Zhenzhen Ye
ECUMN
2007
Springer
14 years 2 months ago
Approach for Reducing Control Packets in AODV-Based MANETs
Movements of nodes in MANETs result in route changes, thus requiring the transmission of control packets. As MANETs have limited resources, it is important to reduce the number of...
David Espes, Cédric Teyssié
ICC
2007
IEEE
124views Communications» more  ICC 2007»
14 years 2 months ago
Emulating End-to-End Losses and Delays for Ad Hoc Networks
— Ad hoc networks have gained place in the research area recently. There are many researches regarding different topics related to such networks, such as routing, media access co...
Alaa Seddik-Ghaleb, Yacine Ghamri-Doudane, Sidi-Mo...
PEWASUN
2004
ACM
14 years 1 months ago
Multipath routing and multiple description coding in ad-hoc networks: a simulation study
The nature of ad hoc networks makes it a challenge to offer connections with an assured quality. In order to improve the performance of the network, multipath routing in combinati...
Irene Fernández Díaz, Dick H. J. Epe...
JSAC
2006
156views more  JSAC 2006»
13 years 8 months ago
Wormhole attacks in wireless networks
Abstract-- As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc...
Yih-Chun Hu, Adrian Perrig, David B. Johnson