Sciweavers

1464 search results - page 226 / 293
» Worst case mobility in ad hoc networks
Sort
View
HICSS
2010
IEEE
222views Biometrics» more  HICSS 2010»
13 years 10 months ago
Application-Layer Intrusion Detection in MANETs
— Security has become important to mobile ad hoc networks (MANETs) due mainly to their use for many missionand life-critical applications. However, the broadcast nature of inter-...
Katharine Chang, Kang G. Shin
WCNC
2010
IEEE
14 years 21 days ago
META: A Mobility Model of MEtropolitan TAxis Extracted from GPS Traces
In this paper, we present our study of extracting a mobility model for vehicular ad hoc networks (VANETs) from a large amount of real taxi GPS trace data. In order to capture char...
Hongyu Huang, Yanmin Zhu, Xu Li, Minglu Li, Min-Yo...
PEWASUN
2006
ACM
14 years 2 months ago
Wave propagation using the photon path map
In wireless network planning, much effort is spent on the improvement of the network and transport layer – especially for Mobile Ad Hoc Networks. Although in principle realworl...
Arne Schmitz, Leif Kobbelt
OPODIS
2008
13 years 10 months ago
Fast Geometric Routing with Concurrent Face Traversal
We present a concurrent face routing CFR algorithm. We formally prove that the worst case latency of our algorithm is asymptotically optimal. Our simulation results demonstrate tha...
Thomas Clouser, Mark Miyashita, Mikhail Nesterenko
ICPR
2006
IEEE
14 years 10 months ago
Adaptive Step Size Window Matching for Detection
An often overlooked problem in matching lies in selecting an appropriate step size. The selection of the step size for real-time applications is critical both from the point of vi...
Nathan Mekuz, Konstantinos G. Derpanis, John K. Ts...