Sciweavers

407 search results - page 50 / 82
» On the capacity improvement of ad hoc wireless networks usin...
Sort
View
JDCTA
2010
150views more  JDCTA 2010»
13 years 2 months ago
Provable Password-Authenticated Key Exchange Protocol against Imposter Attack on Ad Hoc Networks
In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encrypted Key Exchange (EKE) protocol against offline dictionary attacks using both ...
Ang Gao
COLCOM
2005
IEEE
14 years 1 months ago
Location assisted routing for near-far effect mitigation in wireless networks
CDMA technology represents an attractive choice for various wireless ad hoc networks applications, due to its appealing properties, such as resistance to jamming and interference,...
Hassan Mahmood, Cristina Comaniciu
IJWIN
2002
111views more  IJWIN 2002»
13 years 7 months ago
Internet Connectivity for Ad Hoc Mobile Networks
The growing deployment rate of wireless LANs indicates that wireless networking is rapidly becoming a prevalent form of communication. As users become more accustomed to the use o...
Yuan Sun, Elizabeth M. Belding-Royer, Charles E. P...
ISCIS
2004
Springer
14 years 1 months ago
Multicast Routing for Ad Hoc Networks with a Multiclass Scheme for Quality of Service
As multimedia- and group-oriented computing becomes increasingly popular for the users of wireless mobile networks, the importance of features like quality of service (QoS) and mul...
Kaan Bür, Cem Ersoy
WONS
2005
IEEE
14 years 1 months ago
Ant Agents for Hybrid Multipath Routing in Mobile Ad Hoc Networks
In this paper we describe AntHocNet, an algorithm for routing in mobile ad hoc networks based on ideas from the Nature-inspired Ant Colony Optimization framework. The algorithm co...
Frederick Ducatelle, Gianni Di Caro, Luca Maria Ga...