Sciweavers

2684 search results - page 95 / 537
» On the Connectivity of Ad Hoc Networks
Sort
View
SECPERU
2006
IEEE
14 years 2 months ago
Detecting Critical Nodes for MANET Intrusion Detection Systems
Ad hoc routing protocols have been designed to efficiently reroute traffic when confronted with network congestion, faulty nodes, and dynamically changing topologies. The common d...
A. Karygiannis, E. Antonakakis, A. Apostolopoulos
INFOCOM
2003
IEEE
14 years 1 months ago
Resource Optimization of Spatial TDMA in Ad Hoc Radio Networks: A Column Generation Approach
—Wireless communications using ad hoc networks are receiving an increasing interest. The most attractive feature of ad hoc networks is the flexibility. The network is set up by ...
Peter Värbrand, Di Yuan, Patrik Björklun...
ICDCS
2002
IEEE
14 years 1 months ago
A Reliable Multicast Algorithm for Mobile Ad Hoc Networks
: A reliable multicast algorithm, called RMA, for mobile ad hoc networks is presented that is based on a new cost criterion, called link lifetime, for determining the optimal path ...
Thiagaraja Gopalsamy, Mukesh Singhal, Dhabaleswar ...
CORR
2010
Springer
299views Education» more  CORR 2010»
13 years 8 months ago
A New Energy Efficient Routing Algorithm Based on a New Cost Function in Wireless Ad hoc Networks
Wireless ad hoc networks are power constrained since nodes operate with limited battery energy. Thus, energy consumption is crucial in the design of new ad hoc routing protocols. I...
Mehdi Lotfi, Sam Jabbehdari, Majid Asadi Shahmirza...
PE
2006
Springer
193views Optimization» more  PE 2006»
13 years 8 months ago
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content excha...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...