Sciweavers

3009 search results - page 11 / 602
» On Communication Security in Wireless Ad-Hoc Sensor Networks
Sort
View
ICC
2008
IEEE
141views Communications» more  ICC 2008»
14 years 4 months ago
Greedy Hop Distance Routing Using Tree Recovery on Wireless Ad Hoc and Sensor Networks
—Connectivity-based routing protocols use the hop count vector to a group of anchors for packet forwarding. Due to the discrete nature of hop count based coordinates, without an ...
Shao Tao, Akkihebbal L. Ananda, Mun Choon Chan
ICPPW
2005
IEEE
14 years 3 months ago
A New Multipath Routing Approach to Enhancing TCP Security in Ad Hoc Wireless Networks
— In a typical mobile ad hoc network, mobile computing devices wander autonomously and communicate via temporary links in a self-organized computing system without any central ad...
Zhi Li, Yu-Kwong Kwok
TON
2002
189views more  TON 2002»
13 years 9 months ago
Mobility increases the capacity of ad hoc wireless networks
Abstract--The capacity of ad hoc wireless networks is constrained by the mutual interference of concurrent transmissions between nodes. We study a model of an ad hoc network where ...
Matthias Grossglauser, David N. C. Tse
INFOCOM
2008
IEEE
14 years 4 months ago
An Information Model for Geographic Greedy Forwarding in Wireless Ad-Hoc Sensor Networks
—In wireless ad-hoc sensor networks, an important issue often faced in geographic greedy forwarding routing is the “local minimum phenomenon” which is caused by deployment ho...
Zhen Jiang, Junchao Ma, Wei Lou, Jie Wu
AHSWN
2005
171views more  AHSWN 2005»
13 years 9 months ago
Topology Control and Localization in Wireless Ad Hoc and Sensor Networks
Over the last few years, novel architectures like ad hoc and sensor networks have introduced new challenges in the way the communication infrastructure must be addressed. Unlike t...
Peter Gober, Artur Ziviani, Petia Todorova, Marcel...