Sciweavers

702 search results - page 36 / 141
» An overlay approach to data security in ad-hoc networks
Sort
View
IJAHUC
2010
145views more  IJAHUC 2010»
14 years 4 months ago
Towards a routing framework in ad hoc space networks
Abstract: The unique characteristics of space networks lead to different research approaches from those in terrestrial networks. In this paper, a routing framework called Space Gat...
Chao Chen, Zesheng Chen
ISCC
2009
IEEE
177views Communications» more  ISCC 2009»
15 years 4 months ago
SECLOUD: Source and Destination Seclusion Using Clouds for wireless ad hoc networks
—The privacy of communicating entities in wireless ad hoc networks is extremely important due to the potential of their being identified and subsequently subjected to attacks (e...
Razvi Doomun, Thaier Hayajneh, Prashant Krishnamur...
INFOCOM
2003
IEEE
15 years 3 months ago
Power Controlled Dual Channel (PCDC) Medium Access Protocol for Wireless Ad Hoc Networks
—In this paper, we propose a comprehensive solution for power control in mobile ad hoc networks (MANETs). Our solution emphasizes the interplay between the MAC and network layers...
Alaa Muqattash, Marwan Krunz
SAB
2010
Springer
237views Optimization» more  SAB 2010»
14 years 8 months ago
BeeIP: Bee-Inspired Protocol for Routing in Mobile Ad-Hoc Networks
We introduce a new bee-inspired routing protocol for mobile ad hoc networks. Emphasis is given to the ability of bees to evaluate paths by considering several quality factors. In o...
Alexandros Giagkos, Myra S. Wilson
ICDCSW
2009
IEEE
15 years 4 months ago
A Straightforward Path Routing in Wireless Ad Hoc Sensor Networks
Building a “Straightforward” path in wireless ad hoc sensor networks (WASNs) not only avoids wasting energy in detours, but also incurs less interference in other transmission...
Zhen Jiang, Junchao Ma, Wei Lou, Jie Wu