Sciweavers

Share
ADHOCNOW
2003
Springer
9 years 1 months ago
Resisting Malicious Packet Dropping in Wireless Ad Hoc Networks
Most of the routing protocols in wireless ad hoc networks, such as DSR, assume nodes are trustworthy and cooperative. This assumption renders wireless ad hoc networks vulnerable to...
Mike Just, Evangelos Kranakis, Tao Wan
ADHOCNOW
2003
Springer
9 years 1 months ago
Cartesian Ad Hoc Routing Protocols
The growing popularity of ad hoc networks is making their limitations, such as bandwidth and power restrictions, more apparent. As a result, techniques that reduce power consumpti...
Larry Hughes, Kafil Shumon, Ying Zhang
ADHOCNOW
2003
Springer
9 years 1 months ago
A Uniform Continuum Model for Scaling of Ad Hoc Networks
This paper models an ad-hoc network as a continuum of nodes, ignoring edge effects, to find how the traffic scales with N, the number of nodes. We obtain expressions for the traffi...
Ernst W. Grundke, A. Nur Zincir-Heywood
ADHOCNOW
2003
Springer
9 years 1 months ago
Topology Control Problems under Symmetric and Asymmetric Power Thresholds
We consider topology control problems where the goal is to assign transmission powers to the nodes of an ad hoc network so as to induce graphs satisfying speciļ¬c properties. The ...
Sven Oliver Krumke, Rui Liu, Errol L. Lloyd, Madha...
ADHOCNOW
2003
Springer
9 years 1 months ago
Space-Time Routing in Ad Hoc Networks
We introduce Space-Time Routing (STR), a new approach to routing in mobile ad hoc networks. In STR, the age of routing state is considered jointly with the distance to the destinat...
Henri Dubois-Ferrière, Matthias Grossglause...
ADHOCNOW
2003
Springer
9 years 1 months ago
Delivering Messages in Disconnected Mobile Ad Hoc Networks
Ritesh Shah, Norman C. Hutchinson
books