Sciweavers

271 search results - page 33 / 55
» Robust Routing in Malicious Environment for Ad Hoc Networks
Sort
View
ICC
2007
IEEE
136views Communications» more  ICC 2007»
14 years 2 months ago
Cross-layer Networking for Peer Databases over Wireless Ad-Hoc Communities
— Recent advances in wireless technology as well as in electronics industry have given rise to the widespread of wireless ad-hoc networking. Expanding data-centric applications t...
Evangelos Papapetrou, Efthymia Rova, Apostolos Zar...
PADS
2004
ACM
14 years 1 months ago
Simulation Validation Using Direct Execution of Wireless Ad-Hoc Routing Protocols
Computer simulation is the most common approach to studying wireless ad-hoc routing algorithms. The results, however, are only as good as the models the simulation uses. One shoul...
Jason Liu, Yougu Yuan, David M. Nicol, Robert S. G...
IWCMC
2006
ACM
14 years 1 months ago
A novel broadcast technique for high-density ad hoc networks
Broadcasting in ad hoc networks is required for many routing and other network-layer protocols to request information like routes or locations about destination nodes. Most of the...
Ai Hua Ho, Alexander J. Aved, Kien A. Hua
ISCC
2005
IEEE
116views Communications» more  ISCC 2005»
14 years 1 months ago
TPA: A Transport Protocol for Ad Hoc Networks
Several previous works have shown that TCP exhibits poor performance in Mobile Ad Hoc Networks (MANETs). The ultimate reason for this is that MANETs behave in a significantly diff...
Giuseppe Anastasi, Emilio Ancillotti, Marco Conti,...
LCN
2003
IEEE
14 years 1 months ago
Strategies for Finding Stable Paths in Mobile Wireless Ad Hoc Networks
In this paper, we introduce statistical methods to estimate the stability of paths in a mobile wireless ad hoc environment. Identifying stable paths helps to reduce control trafï¬...
Michael Gerharz, Christian de Waal, Peter Martini,...