Sciweavers

702 search results - page 38 / 141
» An overlay approach to data security in ad-hoc networks
Sort
View
MONET
2002
162views more  MONET 2002»
14 years 9 months ago
AMRoute: Ad Hoc Multicast Routing Protocol
The Ad hoc Multicast Routing protocol (AMRoute) presents a novel approach for robust IP Multicast in mobile ad hoc networks by exploiting user-multicast trees and dynamic logical c...
Jason Xie, Rajesh R. Talpade, Anthony McAuley, Min...
MSWIM
2003
ACM
15 years 3 months ago
On the application of traffic engineering over bluetooth ad hoc networks
The seamless communication of data and voice over short-range, point-to-multipoint wireless links between mobile and/or stationary devices is becoming a reality by newly introduce...
Sachin Abhyankar, Rishi Toshniwal, Carlos de M. Co...
NETWORKING
2004
14 years 11 months ago
Performance of Directional Collision Avoidance in Ad Hoc Networks
Abstract. This paper analyzes the performance of directional collision avoidance schemes, in which antenna systems are used to direct the transmission and reception of control and ...
Yu Wang 0007, J. J. Garcia-Luna-Aceves
IC
2010
14 years 7 months ago
Distributed Algorithms for the Placement of Network Services
Network services play an important role in the Internet today. They serve as data caches for websites, servers for multiplayer games and relay nodes for Voice over IP (VoIP) conver...
Todd Sproull, Roger Chamberlain
PIMRC
2008
IEEE
15 years 4 months ago
The limits of theory: Pragmatic challenges in mobile ad hoc systems
—The development of mobile ad hoc systems have considerably emphasized the need for a better understanding of the factors that influence the systems’ performance, i.e., mobili...
Franck Legendre, Martin May, Vincent Lenders, Gunn...