Sciweavers

1455 search results - page 217 / 291
» Policy-Based Mobile Ad Hoc Network Management
Sort
View
PADS
2004
ACM
14 years 2 months ago
Simulation Validation Using Direct Execution of Wireless Ad-Hoc Routing Protocols
Computer simulation is the most common approach to studying wireless ad-hoc routing algorithms. The results, however, are only as good as the models the simulation uses. One shoul...
Jason Liu, Yougu Yuan, David M. Nicol, Robert S. G...
IJNSEC
2011
77views more  IJNSEC 2011»
13 years 4 months ago
Performance Evaluation of the TSS Node Authentication Scheme in Noisy MANETs
This paper presents a description and performance evaluation of a threshold secret sharing (TSS) node authentication scheme in noisy mobile ad hoc networks (MANETs). The scheme ca...
Hussein Al-Bahadili, Shakir Hussain, Ghassan Issa,...
ENTCS
2006
109views more  ENTCS 2006»
13 years 9 months ago
An Overview of MANETs Simulation
Mobile Ad hoc NETworks (MANETs) are dynamic networks populated by mobile stations. Stations in MANETs are usually laptops, PDAs or mobile phones. These devices feature Bluetooth a...
Luc Hogie, Pascal Bouvry, Frédéric G...
CEE
2010
86views more  CEE 2010»
13 years 9 months ago
Scalability of MANET routing protocols for heterogeneous and homogenous networks
In Mobile Ad hoc Network (MANET), mobility, traffic and node density are main network conditions that significantly affect the performance of routing protocols. Much of the previou...
Huda AlAmri, Mehran Abolhasan, Tadeusz A. Wysocki
AUTONOMICS
2007
ACM
14 years 1 months ago
Facet: towards a smart camera network of mobile phones
Smart camera networks provide the opportunity to detect, classify, and trace visual events by means of a wireless network of embedded computing devices equipped with camera sensor...
Philipp Bolliger, Moritz Köhler, Kay Röm...