Sciweavers

1316 search results - page 173 / 264
» Neuroevolution of mobile ad hoc networks
Sort
View
JPDC
2007
191views more  JPDC 2007»
13 years 9 months ago
Clustering wireless ad hoc networks with weakly connected dominating set
The increasing popular personal communications and mobile computing require a wireless network infrastructure that supports selfconfiguration and self-management. Efficient clus...
Bo Han, Weijia Jia
ICPP
2000
IEEE
14 years 1 months ago
Domination and Its Applications in Ad Hoc Wireless Networks with Unidirectional Links
We consider an efficient distributed algorithm for determining a dominating and absorbant set of vertices (mobile hosts) in a given directed graph that represents an ad hoc wirel...
Jie Wu, Hailan Li
IJNM
2008
112views more  IJNM 2008»
13 years 9 months ago
How to avoid packet droppers with proactive routing protocols for ad hoc networks
Routing protocols for mobile ad hoc networks (MANETs) have been an active area of research for the last decade, with many very interesting potential as well as actual applications...
Ignacy Gawedzki, Khaldoun Al Agha
CORR
2007
Springer
93views Education» more  CORR 2007»
13 years 9 months ago
A Framework for Providing E-Services to the Rural Areas using Wireless Ad Hoc and Sensor Networks
In recent years, the proliferation of mobile computing devices has driven a revolutionary change in the computing world. The nature of ubiquitous devices makes wireless networks th...
Al-Sakib Khan Pathan, Humayun Kadir Islam, Sabit A...
ICC
2007
IEEE
206views Communications» more  ICC 2007»
14 years 3 months ago
ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks
— In this paper, we present a novel anonymous secure routing protocol for mobile ad hoc networks (MANETs). The proposed protocol not only provides anonymity from all the intermed...
Xiaodong Lin, Rongxing Lu, Haojin Zhu, Pin-Han Ho,...