Sciweavers

138 search results - page 4 / 28
» Packet forwarding with source verification
Sort
View
WIOPT
2010
IEEE
13 years 9 months ago
Evolutionary forwarding games in Delay Tolerant Networks
—In this paper, we apply evolutionary games to non-cooperative forwarding control of Delay Tolerant Networks (DTN). We focus our study on the probability to deliver a message fro...
Rachid El Azouzi, Francesco De Pellegrini, Vijay K...
ICC
2007
IEEE
117views Communications» more  ICC 2007»
14 years 5 months ago
Modeling Hop Length Distributions for Reactive Routing Protocols in One Dimensional MANETs
— In mobile ad hoc networks (MANETs), packets hop from a source to a series of forwarding nodes until they reach the desired destination. Defining the hop length to be the dista...
Chuan Heng Foh, Juki Wirawan Tantra, Jianfei Cai, ...
ADHOC
2006
86views more  ADHOC 2006»
13 years 11 months ago
An implementation framework for trajectory-based routing in ad hoc networks
Routing in ad-hoc networks is a complicated task because of many reasons. The nodes are low-memory, lowpowered, and they cannot maintain routing tables large enough for well-known ...
Murat Yuksel, Ritesh Pradhan, Shivkumar Kalyanaram...
INFORMATICALT
2006
116views more  INFORMATICALT 2006»
13 years 11 months ago
Optimized on Demand Routing Protocol of Mobile Ad Hoc Network
In this paper optimization of DSR is achieved using New Link Cache structure and Source Transparent Route Maintenance Method. The new link cache effectively utilizes the memory by ...
Chinnappan Jayakumar, Chenniappan Chellappan
WONS
2005
IEEE
14 years 4 months ago
The Pulse Protocol: Mobile Ad hoc Network Performance Evaluation
— We present a performance evaluation of the Pulse protocol operating in a peer-to-peer mobile ad hoc network environment. The Pulse protocol utilizes a periodic flood (the puls...
Baruch Awerbuch, David Holmer, Herbert Rubens