Sciweavers

1035 search results - page 41 / 207
» System Services for Implementing Ad-Hoc Routing Protocols
Sort
View
ADHOCNOW
2004
Springer
14 years 1 months ago
Weathering the Storm: Managing Redundancy and Security in Ad Hoc Networks
Many ad hoc routing algorithms rely on broadcast flooding for location discovery or more generally for secure routing applications, particularly when dealing with Byzantine threat...
Mike Burmester, Tri Van Le, Alec Yasinsac
PEWASUN
2005
ACM
14 years 1 months ago
Impact of multipath fading in wireless ad hoc networks
This paper examines several MANET behaviors and suggests root causes using a stochastic model of received power. It focuses specifically on MANET mechanisms most impacted by fin...
John Mullen, Hong Huang
NCA
2005
IEEE
14 years 1 months ago
Providing Hard Real-Time Guarantees in Context-Aware Applications: Challenges and Requirements
Context-aware applications rely on the ability to perceive the state of the surrounding environment. In this paper, we address a class of such applications where real-time guarant...
Malika Boulkenafed, Barbara Hughes, René Me...
COMCOM
2008
131views more  COMCOM 2008»
13 years 7 months ago
CORA: Collaborative Opportunistic Recovery Algorithm for loss controlled, delay bounded ad hoc multicast
In this paper, we present Collaborative Opportunistic Recovery Algorithm (CORA) designed for multicast multimedia applications with low loss as well as latency constraints in ad h...
Yunjung Yi, Jiejun Kong, Mario Gerla, Joon-Sang Pa...
ICWN
2003
13 years 9 months ago
Performance of Mobile Ad Hoc Network in Constrained Mobility Pattern
Mobile Ad Hoc Networks (MANET) performance is affected by a number of factors, eg. speed, node density. In this paper we will focus on the effect of constrained mobility on the per...
Bu-Sung Lee, Kai Juan Wong, Boon-Chong Seet, Lijua...