Sciweavers

605 search results - page 75 / 121
» Secure Routing Protocol with Malicious Nodes Detection for A...
Sort
View
P2P
2008
IEEE
184views Communications» more  P2P 2008»
14 years 3 months ago
Ad Hoc Limited Scale-Free Models for Unstructured Peer-to-Peer Networks
Several protocol efficiency metrics (e.g., scalability, search success rate, routing reachability and stability) depend on the capability of preserving structure even over the ch...
Hasan Guclu, Durgesh Kumari, Murat Yuksel
MOBIHOC
2004
ACM
14 years 2 months ago
On the behavior of communication links of a node in a multi-hop mobile environment
In this work, we develop an analytical framework to investigate the behavior of the communication links of a node in a random mobility environment. Analytical expressions characte...
Prince Samar, Stephen B. Wicker
SECON
2010
IEEE
13 years 6 months ago
Distributed Routing, Relay Selection, and Spectrum Allocation in Cognitive and Cooperative Ad Hoc Networks
Throughput maximization is a key challenge in cognitive radio ad hoc networks, where the availability of local spectrum resources may change from time to time and hopby-hop. To ach...
Lei Ding, Tommaso Melodia, Stella N. Batalama, Joh...
WIMOB
2008
IEEE
14 years 3 months ago
Cross-Layer Self Routing: A Self-Managed Routing Approach for MANETs
—Mobile ad hoc networks (MANETs) generally adopt a peer-to-peer architecture in which the nodes themselves provide routing and services to the network. Disconnectivity with peer ...
Mohammad Abdur Razzaque, Simon Dobson, Paddy Nixon
COMCOM
2006
123views more  COMCOM 2006»
13 years 8 months ago
Modeling the performance of flooding in wireless multi-hop Ad hoc networks
One feature common to most existing routing protocols for wireless mobile ad hoc networks, or MANETs, is the need to flood control messages network-wide during the route acquisiti...
Kumar Viswanath, Katia Obraczka