Sciweavers

1464 search results - page 82 / 293
» Worst case mobility in ad hoc networks
Sort
View
CIIT
2007
195views Communications» more  CIIT 2007»
13 years 9 months ago
Using a cache scheme to detect selfish nodes in mobile ad hoc networks
This paper presents a hardware based cache scheme to detect selfish nodes in mobile ad hoc network. In this scheme, the hardware monitors the activities of the upperlayer software...
H. Lin, José G. Delgado-Frias, Sirisha Medi...
ICON
2007
IEEE
14 years 2 months ago
Using a Cache Scheme to Detect Misbehaving Nodes in Mobile Ad-Hoc Networks
-- This paper presents a hardware based cache scheme to detect misbehaving nodes in mobile ad hoc network. In this scheme, the hardware monitors the activities of the upper-layer s...
Hongxun Liu, José G. Delgado-Frias, Sirisha...
MSWIM
2006
ACM
14 years 1 months ago
The effect of the radio wave propagation model in mobile ad hoc networks
The simulation of wireless networks has been an important tool for researchers and the industry in the last years. Especially in the field of Mobile Ad Hoc Networking, most curre...
Arne Schmitz, Martin Wenig
MASCOTS
2004
13 years 9 months ago
On Mobility-Capacity-Delay Trade-off in Wireless Ad Hoc Networks
We show that there is a trade off among mobility, capacity, and delay in ad hoc networks. More specifically, we consider two schemes for mobility of nodes in ad hoc networks. We d...
Renato M. de Moraes, Hamid R. Sadjadpour, Jose Joa...
MOBIHOC
2002
ACM
14 years 7 months ago
Weak duplicate address detection in mobile ad hoc networks
Auto-configuration is a desirable goal in implementing mobile ad hoc networks. Specifically, automated dynamic assignment (without manual intervention) of IP addresses is desirabl...
Nitin H. Vaidya