Sciweavers

99 search results - page 3 / 20
» Experimenting with an Ad Hoc wireless network on campus: ins...
Sort
View
PE
2006
Springer
193views Optimization» more  PE 2006»
13 years 5 months ago
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content excha...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
ISCAS
2005
IEEE
199views Hardware» more  ISCAS 2005»
13 years 11 months ago
Congestion-optimized scheduling of video over wireless ad hoc networks
We analyze the benefits of information sharing between the application layer and the transport layer, for streaming video encoded at several different qualities, in a mobile wir...
Eric Setton, Xiaoqing Zhu, Bernd Girod
PEWASUN
2004
ACM
13 years 10 months ago
A novel solution for achieving anonymity in wireless ad hoc networks
A mobile ad hoc network consists of mobile nodes that can move freely in an open environment. Communicating nodes in a wireless and mobile ad hoc network usually seek the help of ...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
ADHOCNETS
2009
Springer
13 years 12 months ago
Buckshot Routing - A Robust Source Routing Protocol for Dense Ad-Hoc Networks
Experiments with wireless sensor networks have shown that unidirectional communication links are quite common. What is even more, they have also shown that the range of a unidirect...
David Peters, Reinhardt Karnapke, Jörg Nolte
ADHOCNOW
2003
Springer
13 years 10 months ago
Resisting Malicious Packet Dropping in Wireless Ad Hoc Networks
Most of the routing protocols in wireless ad hoc networks, such as DSR, assume nodes are trustworthy and cooperative. This assumption renders wireless ad hoc networks vulnerable to...
Mike Just, Evangelos Kranakis, Tao Wan