Sciweavers

1464 search results - page 37 / 293
» Worst case mobility in ad hoc networks
Sort
View
ISCC
2007
IEEE
130views Communications» more  ISCC 2007»
14 years 1 months ago
Pre-Authentication Based Enhancement for Access Control in Hybrid MANETs
We analyze the problem of reducing packet losses due to the authentication time which is required when an ad hoc node switches across different gateways in a mobile ad hoc network...
Rafael Marín López, Pedro M. Ruiz, F...
IWCMC
2006
ACM
14 years 1 months ago
Analysis of mobile beacon aided in-range localization scheme in ad hoc wireless sensor networks
In this paper, We mathematically model the In-Range localization scheme in the presence of a Mobile Beacon. In the In-Range localization scheme, a sensor with unknown location is ...
T. V. Srinath, Anil Kumar Katti, V. S. Ananthanara...
TRIDENTCOM
2005
IEEE
14 years 1 months ago
A Testbed and Methodology for Experimental Evaluation of Wireless Mobile Ad hoc Networks
Wireless mobile ad hoc network experimentation is subjected to stochastic factors from the radio environment and node mobility. To achieve test repeatability and result reproducib...
Erik Nordström, Per Gunningberg, Henrik Lundg...
MUM
2006
ACM
181views Multimedia» more  MUM 2006»
14 years 1 months ago
Cross-layer design for providing service oriented architecture in a mobile Ad Hoc network
This paper presents a novel cross-layer design for providing service oriented architecture (SOA) in a mobile ad hoc network (MANET). In the design SOA service discovery is integra...
Tommi Halonen, Timo Ojala
PE
2006
Springer
193views Optimization» more  PE 2006»
13 years 7 months ago
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content excha...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...