Sciweavers

1359 search results - page 177 / 272
» Equational Reasoning on Mobile Ad Hoc Networks
Sort
View
IJNM
2008
112views more  IJNM 2008»
15 years 22 days ago
How to avoid packet droppers with proactive routing protocols for ad hoc networks
Routing protocols for mobile ad hoc networks (MANETs) have been an active area of research for the last decade, with many very interesting potential as well as actual applications...
Ignacy Gawedzki, Khaldoun Al Agha
116
Voted
CORR
2007
Springer
93views Education» more  CORR 2007»
15 years 21 days ago
A Framework for Providing E-Services to the Rural Areas using Wireless Ad Hoc and Sensor Networks
In recent years, the proliferation of mobile computing devices has driven a revolutionary change in the computing world. The nature of ubiquitous devices makes wireless networks th...
Al-Sakib Khan Pathan, Humayun Kadir Islam, Sabit A...
TC
2008
15 years 19 days ago
Iterative Local Solutions for Connected Dominating Set in Ad Hoc Wireless Networks
We propose a general framework of the iterative local solution (ILS) for computing a connected dominating set (CDS) in ad hoc wireless networks, which include wireless sensor netwo...
Jie Wu, Fei Dai, Shuhui Yang
125
Voted
JPDC
2007
191views more  JPDC 2007»
15 years 18 days ago
Clustering wireless ad hoc networks with weakly connected dominating set
The increasing popular personal communications and mobile computing require a wireless network infrastructure that supports selfconfiguration and self-management. Efficient clus...
Bo Han, Weijia Jia
107
Voted
ICC
2007
IEEE
206views Communications» more  ICC 2007»
15 years 7 months ago
ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks
— In this paper, we present a novel anonymous secure routing protocol for mobile ad hoc networks (MANETs). The proposed protocol not only provides anonymity from all the intermed...
Xiaodong Lin, Rongxing Lu, Haojin Zhu, Pin-Han Ho,...