Sciweavers

288 search results - page 14 / 58
» Query-Based Model Checking of Ad Hoc Network Protocols
Sort
View
VALUETOOLS
2006
ACM
112views Hardware» more  VALUETOOLS 2006»
14 years 1 months ago
Performance of ad hoc networks with two-hop relay routing and limited packet lifetime
— Considered is a mobile ad hoc network consisting of three types of nodes (source, destination and relay nodes) and using the two-hop relay routing protocol. Packets at relay no...
Ahmad Al Hanbali, Philippe Nain, Eitan Altman
ICC
2009
IEEE
136views Communications» more  ICC 2009»
14 years 2 months ago
Fast Connected Dominating Set Construction in Mobile Ad Hoc Networks
—The connected dominating set (CDS) has been commonly used for routing and broadcast in mobile ad hoc networks (MANETs). Considering the applications of MANETs, it is generally p...
Kazuya Sakai, Min-Te Sun, Wei-Shinn Ku
ENTCS
2006
173views more  ENTCS 2006»
13 years 7 months ago
Formal Security Analysis for Ad-Hoc Networks
In ad-hoc networks, autonomous wireless nodes can communicate by forwarding messages for each other. For routing protocols in this setting, it is known that a malicious node can p...
Sebastian Nanz, Chris Hankin
MOBICOM
2003
ACM
14 years 24 days ago
Towards realistic mobility models for mobile ad hoc networks
One of the most important methods for evaluating the characteristics of ad hoc networking protocols is through the use of simulation. Simulation provides researchers with a number...
Amit P. Jardosh, Elizabeth M. Belding-Royer, Kevin...
RAID
2004
Springer
14 years 27 days ago
Attack Analysis and Detection for Ad Hoc Routing Protocols
Abstract. Attack analysis is a challenging problem, especially in emerging environments where there are few known attack cases. One such new environment is the Mobile Ad hoc Networ...
Yi-an Huang, Wenke Lee