Sciweavers

2691 search results - page 466 / 539
» Security in Ad Hoc Networks
Sort
View
AICCSA
2006
IEEE
126views Hardware» more  AICCSA 2006»
14 years 4 months ago
Restricted Shortest Path Routing with Concave Costs
Multi-constraint quality-of-service routing has become increasingly important as the Internet evolves to support real-time services. Restricted shortest path (RSP) is one of the i...
Pejman Khadivi, Shadrokh Samavi, Hossein Saidi
ICOIN
2004
Springer
14 years 3 months ago
Performance of New Broadcast Forwarding Criteria in MANET
In a mobile ad hoc network (MANET), packet broadcast is common and frequently used to disseminate information. Broadcast consume large amount of bandwidth resource, which is scarce...
Lijuan Zhu, Bu-Sung Lee, Boon-Chong Seet, Kai Juan...
CCCG
2010
13 years 11 months ago
3d local algorithm for dominating sets of unit disk graphs
A dominating set of a graph G = (V, E) is a subset V V of the nodes such that for all nodes v V , either v V or a neighbor u of v is in V . Several routing protocols in ad hoc ...
Alaa Eddien Abdallah, Thomas Fevens, Jaroslav Opat...
SIMUTOOLS
2008
13 years 11 months ago
Efficient and realistic mobility and channel modeling for VANET scenarios using OMNeT++ and INET-framework
Mobility and channel modeling is a very crucial task for the simulation of Vehicular Ad Hoc Network (VANET) scenarios. In this paper we present a new mobility modeling approach fo...
Robert Nagel, Stephan Eichler
ICDCSW
2008
IEEE
14 years 4 months ago
Pairing Devices with Good Quality Output Interfaces
The operation of achieving authenticated key agreement between two human-operated devices over a short range wireless communication channel, such as Bluetooth or WiFi, is known as...
Nitesh Saxena, Jonathan Voris