Sciweavers

182 search results - page 15 / 37
» Cryptographic techniques for mobile ad-hoc networks
Sort
View
MOBIHOC
2001
ACM
15 years 12 months ago
A comparison of TCP performance over three routing protocols for mobile ad hoc networks
We examine the performance of the TCP protocol for bulkdata transfers in mobile ad hoc networks (MANETs). We vary the number of TCP connections and compare the performances of thr...
Thomas D. Dyer, Rajendra V. Boppana
MIS
2007
Springer
163views Multimedia» more  MIS 2007»
14 years 12 months ago
Cooperative caching in mobile ad hoc networks based on data utility
Cooperative caching, which allows sharing and coordination of cached data among clients, is a potential technique to improve the data access performance and availability in mobile ...
Narottam Chand, Ramesh C. Joshi, Manoj Misra
TON
2012
13 years 2 months ago
Declarative Policy-Based Adaptive Mobile Ad Hoc Networking
—This paper presents DAWN, a declarative platform that creates highly adaptive policy-based MANET protocols. DAWN leverages declarative networking techniques to achieve extensibl...
Changbin Liu, Ricardo Correa, Xiaozhou Li, Prithwi...
112
Voted
ADHOC
2008
88views more  ADHOC 2008»
15 years 14 days ago
Safari: A self-organizing, hierarchical architecture for scalable ad hoc networking
As wireless devices become more pervasive, mobile ad hoc networks are gaining importance, motivating the development of highly scalable ad hoc networking techniques. In this paper...
Shu Du, Ahamed Khan, Santashil PalChaudhuri, Ansle...
VTC
2006
IEEE
136views Communications» more  VTC 2006»
15 years 6 months ago
M3RP: Multi-rate/Multi-range Multicast Routing Protocol for Mobile Ad Hoc Networks
— Group Communication services have become more and more important in mobile ad hoc networks (MANETs). The use of multicast transmission techniques in MANETs has been shown to ha...
Jenhui Chen, Jhenjhong Guo, Chih-Chieh Wang