Sciweavers

383 search results - page 25 / 77
» Exchange power management for mobile ad hoc networks
Sort
View
74
Voted
SAC
2008
ACM
14 years 9 months ago
Publish/subscribe architecture for mobile ad hoc networks
Publish/Subscribe architectures have been widely studied and applied in wired networks. However, their deployment on mobile ad hoc networks still presents a lot of challenges. Thi...
Cristiano G. Rezende, Bruno P. S. Rocha, Antonio A...
CORR
2008
Springer
108views Education» more  CORR 2008»
14 years 9 months ago
Restricted Mobility Improves Delay-Throughput Trade-offs in Mobile Ad-Hoc Networks
Abstract-- In this paper, we analyze asymptotic delaythroughput trade-offs in mobile ad-hoc networks comprising heterogeneous nodes with restricted mobility. We show that node spat...
Michele Garetto, Emilio Leonardi
ICCCN
2008
IEEE
15 years 4 months ago
Multi-Path Intelligent Virtual Mobile Nodes for Ad Hoc Networks
—In mobile ad hoc networks, solving the standard problems encountered in fixed networks can be challenging because of the unpredictable motion of mobile nodes. Due to the lack o...
Binbin Qian, Jie Wu
122
Voted
MOBICOM
1998
ACM
15 years 1 months ago
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols
An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administra...
Josh Broch, David A. Maltz, David B. Johnson, Yih-...
CN
2007
172views more  CN 2007»
14 years 9 months ago
Threshold cryptography in P2P and MANETs: The case of access control
Ad hoc groups, such as peer-to-peer (P2P) systems and mobile ad hoc networks (MANETs) represent recent technological advancements. They support low-cost, scalable and fault-tolera...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi