Sciweavers

Share
EJWCN
2010
119views more  EJWCN 2010»
8 years 5 months ago
Simulations of the Impact of Controlled Mobility for Routing Protocols
This paper addresses mobility control routing in wireless networks. Given a data flow request between a sourcedestination pair, the problem is to move nodes towards the best placem...
Valeria Loscrì, Enrico Natalizio, Carmelo C...
ICC
2009
IEEE
167views Communications» more  ICC 2009»
8 years 8 months ago
Efficient Adaptive Routing in Delay Tolerant Networks
Conventional routing algorithms in mobile ad hoc networks (MANETs), i.e., multi-hop forwarding, assume the existence of contemporaneous source-destination paths and are not scalabl...
Cong Liu, Jie Wu
SECON
2010
IEEE
8 years 8 months ago
Trajectory-Aware Communication Solution for Underwater Gliders Using WHOI Micro-Modems
The predictable trajectory of underwater gliders can be used in geographic routing protocols. Factors such as drifting and localization errors cause uncertainty when estimating a g...
Baozhi Chen, Patrick C. Hickey, Dario Pompili
MASS
2010
140views Communications» more  MASS 2010»
8 years 8 months ago
InterMR: Inter-MANET routing in heterogeneous MANETs
The advancements of diverse radio technologies and emerging applications have spawned increasing heterogeneity in mobile ad hoc networks (MANETs). But the collaborative nature of c...
Seung-Hoon Lee, Starsky H. Y. Wong, Chi-Kin Chau, ...
PE
2007
Springer
175views Optimization» more  PE 2007»
8 years 9 months ago
Delay and resource analysis in MANETs in presence of throwboxes
This paper addresses the delay analysis and resource consumption in mobile ad hoc networks (MANETs) equipped with throwboxes. Throwboxes are stationary, wireless devices that act ...
Mouhamad Ibrahim, Ahmad Al Hanbali, Philippe Nain
JUCS
2007
164views more  JUCS 2007»
8 years 10 months ago
An Adaptive Hierarchical Extension of DSR: The Cluster Source Routing
: Numerous studies have shown the difficulty for a single routing protocol to scale with respect to mobility and network size in wireless ad hoc networks. This paper presents a clu...
Farid Jaddi, Béatrice Paillassa
ADHOC
2005
134views more  ADHOC 2005»
8 years 10 months ago
How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols
This paper presents a systematic analysis of insider attacks against mobile ad-hoc routing protocols, using the Ad hoc On-Demand Distance Vector (AODV) protocol as an example. It ...
Peng Ning, Kun Sun
ADHOC
2005
165views more  ADHOC 2005»
8 years 10 months ago
A survey on routing protocols for wireless sensor networks
Recent advances in wireless sensor networks have led to many new protocols specifically designed for sensor networks where energy awareness is an essential consideration. Most of ...
Kemal Akkaya, Mohamed F. Younis
PE
2006
Springer
193views Optimization» more  PE 2006»
8 years 10 months ago
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content excha...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
JCM
2006
117views more  JCM 2006»
8 years 10 months ago
Routing in Multi-Channel Wireless Ad-hoc Networks: OSPF-MCDS-MC
Unghee Lee, Scott F. Midkiff, Tao Lin
books