Sciweavers

1677 search results - page 211 / 336
» A distributed security scheme for ad hoc networks
Sort
View
WDAG
2009
Springer
114views Algorithms» more  WDAG 2009»
15 years 4 months ago
Virtual Ring Routing Trends
Virtual Ring Routing (VRR) schemes were introduced in the context of wireless ad hoc networks and Internet anycast overlays. They build a network-routing layer using ideas from dis...
Dahlia Malkhi, Siddhartha Sen, Kunal Talwar, Renat...
75
Voted
IWCMC
2006
ACM
15 years 4 months ago
Performance of Taroko: a cluster-based addressing and routing scheme for self-organized networks
Self-Organized Networks (SONs) are a general description of autonomous networks without infrastructure, of which Ad Hoc, Sensor and Mesh networks are special cases. We had previou...
Julien Ridoux, Meriem Kassar, Mathias Boc, Anne Fl...
73
Voted
VTC
2007
IEEE
15 years 4 months ago
Mobility-Aware Data Management on Mobile Wireless Networks
— We design a Mobility-aware DAta management (MoDA) scheme for mobile ad hoc networks (MANETs) composed by mobile nodes such as urban pedestrians and vehicles. By fully utilizing...
Akiko Yamasaki, Hirozumi Yamaguchi, Shinji Kusumot...
ADHOC
2006
100views more  ADHOC 2006»
14 years 10 months ago
Radio range adjustment for energy efficient wireless sensor networks
In wireless ad hoc sensor networks, energy use is in many cases the most important constraint since it corresponds directly to operational lifetime. Topology management schemes su...
Quang Gao, Keith J. Blow, David J. Holding, Ian W....
WWIC
2004
Springer
143views Communications» more  WWIC 2004»
15 years 3 months ago
CGGC: Cached Greedy Geocast
Abstract. With cached greedy geocast, we propose an enhanced forwarding scheme for geocast especially in highly mobile ad hoc networks. We will show, that a cache for presently unf...
Christian Maihöfer, Reinhold Eberhardt, Elmar...