Sciweavers

851 search results - page 97 / 171
» Secure Mobile Agents on Ad Hoc Wireless Networks
Sort
View
ISCC
2007
IEEE
100views Communications» more  ISCC 2007»
14 years 3 months ago
End-to-End Mean Bandwidth Estimation as a Function of Packet Length in Mobile Ad Hoc Networks
Many methods for end-to-end bandwidth estimation on wired networks assume that link capacities are constant and that all cross-traffic interaction occurs through queuing delays at...
Marco A. Alzate, Maria P. Salamanca, Néstor...
CISS
2008
IEEE
14 years 3 months ago
Optimizing redundancy using MDS codes and dynamic symbol allocation in mobile ad hoc networks
—We consider the design of a network in which packet transmissions between two nodes are to be guaranteed a certain probability of success. There are N independent paths between ...
Anna Kacewicz, Stephen B. Wicker
GLOBECOM
2009
IEEE
14 years 3 months ago
A Distributed Constraint Satisfaction Problem for Virtual Device Composition in Mobile Ad Hoc Networks
— The dynamic composition of systems of networked appliances, or virtual devices, enables users to generate complex strong specific systems. Current prominent MANET-based composi...
Eric Karmouch, Amiya Nayak
PEWASUN
2004
ACM
14 years 2 months ago
A routing protocol for power constrained networks with asymmetric links
In many instances, an ad hoc network consists of nodes with different hardware and software capabilities as well as power limitations. This is the case of ad hoc grids where devi...
Guoqiang Wang, Yongchang Ji, Dan C. Marinescu, Dam...
IEEEIAS
2008
IEEE
14 years 3 months ago
A Friend Mechanism for Mobile Ad Hoc Networks
: In the autonomous environment of mobile ad hoc network (MANET) where nodes are free to move around and depend on each other to initiate communication, cooperation among nodes is ...
Shukor Abd Razak, Normalia Samian, Mohd Aizaini Ma...