Sciweavers

269 search results - page 3 / 54
» Simulation Validation Using Direct Execution of Wireless Ad-...
Sort
View
RAID
2004
Springer
13 years 11 months ago
Attack Analysis and Detection for Ad Hoc Routing Protocols
Abstract. Attack analysis is a challenging problem, especially in emerging environments where there are few known attack cases. One such new environment is the Mobile Ad hoc Networ...
Yi-an Huang, Wenke Lee
INFOCOM
2003
IEEE
13 years 11 months ago
Power Controlled Dual Channel (PCDC) Medium Access Protocol for Wireless Ad Hoc Networks
—In this paper, we propose a comprehensive solution for power control in mobile ad hoc networks (MANETs). Our solution emphasizes the interplay between the MAC and network layers...
Alaa Muqattash, Marwan Krunz
JNSM
2002
218views more  JNSM 2002»
13 years 5 months ago
An Agent-based Connection Management Protocol for Ad Hoc Wireless Networks
Realizing high volume of data transmission in real time communication in a highly dynamic architecture like Mobile Ad hoc Networks (MANET) still remains a major point of research....
Romit Roy Choudhury, Krishna Paul, Somprakash Band...
CORR
2010
Springer
175views Education» more  CORR 2010»
13 years 4 months ago
Efficient Packet Forwarding Approach in Vehicular Ad Hoc Networks Using EBGR Algorithm
VANETs (Vehicular Ad hoc Networks) are highly mobile wireless ad hoc networks and will play an important role in public safety communications and commercial applications. Routing ...
K. Prasanth, K. Duraiswamy, K. Jayasudha, C. Chand...
VALUETOOLS
2006
ACM
112views Hardware» more  VALUETOOLS 2006»
13 years 11 months ago
Performance of ad hoc networks with two-hop relay routing and limited packet lifetime
— Considered is a mobile ad hoc network consisting of three types of nodes (source, destination and relay nodes) and using the two-hop relay routing protocol. Packets at relay no...
Ahmad Al Hanbali, Philippe Nain, Eitan Altman