Sciweavers

1247 search results - page 156 / 250
» Designing Secure Wireless Mobile Ad Hoc Networks
Sort
View
PADS
2004
ACM
15 years 3 months ago
Simulation Validation Using Direct Execution of Wireless Ad-Hoc Routing Protocols
Computer simulation is the most common approach to studying wireless ad-hoc routing algorithms. The results, however, are only as good as the models the simulation uses. One shoul...
Jason Liu, Yougu Yuan, David M. Nicol, Robert S. G...
ICWN
2004
14 years 11 months ago
An Architecture Supporting Run-Time Upgrade of Proxy-Based Services in Ad Hoc Networks
Abstract-- In the proxy approach to Service Oriented Computing, a service advertises a proxy, which is searched for, retrieved and used by interested clients as a local handle to t...
Rohan Sen, Radu Handorean, Gregory Hackmann, Gruia...
INFOCOM
2008
IEEE
15 years 4 months ago
DRIP: A Dynamic VoRonoi RegIons-Based Publish/Subscribe Protocol in Mobile Networks
—The publish/subscribe (pub/sub for short) paradigm is used to deliver events from a source to interested clients in an asynchronous way. Recently, extending a pub/sub system in ...
Quan Yuan, Jie Wu
IJDSN
2006
143views more  IJDSN 2006»
14 years 10 months ago
MicroRouting: A Scalable and Robust Communication Paradigm for Sparse Ad Hoc Networks
Mobile ad hoc networks are self-organizing networks that provide rapid network connectivity in infrastructureless environments. Most routing protocols designed for MANETs assume c...
Saumitra M. Das, Himabindu Pucha, Y. Charlie Hu
ADHOC
2005
139views more  ADHOC 2005»
14 years 10 months ago
Improving TCP performance in ad hoc networks using signal strength based link management
Mobility in ad hoc networks causes frequent link failures, which in turn causes packet losses. TCP attributes these packet losses to congestion. This incorrect inference results i...
Fabius Klemm, Zhenqiang Ye, Srikanth V. Krishnamur...