Sciweavers

170 search results - page 25 / 34
» Using a two-timer scheme to detect selfish nodes in mobile a...
Sort
View
BROADNETS
2004
IEEE
13 years 11 months ago
DCC-MAC: A Decentralized MAC Protocol for 802.15.4a-like UWB Mobile Ad-Hoc Networks Based on Dynamic Channel Coding
We present a joint PHY/MAC architecture (DCC-MAC) for 802.15.4a-like networks based on PPM-UWB. Unlike traditional approaches it fully utilizes the specific nature of UWB to achie...
Jean-Yves Le Boudec, Ruben Merz, Bozidar Radunovic...
IAJIT
2007
150views more  IAJIT 2007»
13 years 7 months ago
Fuzzy Active Queue Management for Congestion Control in Wireless Ad-Hoc
: Mobile ad-hoc network is a network without infrastructure where every node has its own protocols and services for powerful cooperation in the network. Every node also has the abi...
Essam Natsheh, Adznan B. Jantan, Sabira Khatun, Su...
IJNSEC
2011
77views more  IJNSEC 2011»
13 years 2 months ago
Performance Evaluation of the TSS Node Authentication Scheme in Noisy MANETs
This paper presents a description and performance evaluation of a threshold secret sharing (TSS) node authentication scheme in noisy mobile ad hoc networks (MANETs). The scheme ca...
Hussein Al-Bahadili, Shakir Hussain, Ghassan Issa,...
ADHOC
2006
167views more  ADHOC 2006»
13 years 7 months ago
Bypass routing: An on-demand local recovery protocol for ad hoc networks
Abstract--On-demand routing protocols for ad hoc networks reduce the cost of routing in high mobility environments. However, route discovery in on-demand routing is typically perfo...
Cigdem Sengul, Robin Kravets
TC
2008
13 years 7 months ago
Iterative Local Solutions for Connected Dominating Set in Ad Hoc Wireless Networks
We propose a general framework of the iterative local solution (ILS) for computing a connected dominating set (CDS) in ad hoc wireless networks, which include wireless sensor netwo...
Jie Wu, Fei Dai, Shuhui Yang