Sciweavers

2691 search results - page 473 / 539
» Security in Ad Hoc Networks
Sort
View
DIALM
2008
ACM
140views Algorithms» more  DIALM 2008»
13 years 11 months ago
Latency of opportunistic forwarding in finite regular wireless networks
In opportunistic forwarding, a node randomly relays packets to one of its neighbors based on local information, without the knowledge of global topology. Each intermediate node co...
Prithwish Basu, Chi-Kin Chau
GIS
2008
ACM
13 years 11 months ago
Spatial queries in disconnected mobile networks
In this paper we study in-network query processing in disconnected mobile environments, where both ad-hoc communication and infrastructure communication are available. Depending o...
Xinjuan Zhu, Bo Xu, Ouri Wolfson
IEICET
2008
136views more  IEICET 2008»
13 years 10 months ago
Delay Analysis of Car-to-Car Reliable Data Delivery Strategies Based on Data Mulling with Network Coding
Abstract--Vehicular ad hoc networks (VANET) aims to enhance vehicle navigation safety by providing an early warning system: any chance of accidents is informed through the wireless...
Joon-Sang Park, Uichin Lee, Soon-Young Oh, Mario G...
COMCOM
2007
94views more  COMCOM 2007»
13 years 10 months ago
Adaptive backup routing for ad-hoc networks
The network topology changes frequently in ad-hoc networks. Some on-demand protocols with multi-paths or backup routes have been proposed to improve the performance in ad-hoc netw...
Wei Kuang Lai, Sheng-Yu Hsiao, Yuh-Chung Lin
DPD
2007
100views more  DPD 2007»
13 years 10 months ago
Managing real-time database transactions in mobile ad-hoc networks
In a mobile ad-hoc network (MANET), mobile hosts can move freely and communicate with each other directly through a wireless medium without the existence of a fixed wired infrastr...
Le Gruenwald, Shankar M. Banik, Chuo N. Lau