Sciweavers

555 search results - page 26 / 111
» Irrigating ad hoc networks in constant time
Sort
View
SASN
2003
ACM
15 years 2 months ago
Modeling vulnerabilities of ad hoc routing protocols
The purpose of this work is to automate the analysis of ad hoc routing protocols in the presence of attackers. To this end, a formal model of protocol behavior is developed in whi...
Shahan Yang, John S. Baras
IPPS
2006
IEEE
15 years 3 months ago
Comparative study of price-based resource allocation algorithms for ad hoc networks
As mobile ad hoc networks provide a wide range of possibly critical services, providing quality of service guarantees becomes an essential element. Yet there is a limited understa...
Marcel Lüthi, Simin Nadjm-Tehrani, Calin Cure...
PERVASIVE
2004
Springer
15 years 3 months ago
Accommodating Transient Connectivity in Ad Hoc and Mobile Settings
Much of the work on networking and communications is based on the premise that components interact in one of two ways: either they are connected via a stable wired or wireless netw...
Radu Handorean, Christopher D. Gill, Gruia-Catalin...
DIALM
2003
ACM
133views Algorithms» more  DIALM 2003»
15 years 2 months ago
Ad-hoc networks beyond unit disk graphs
In this paper, we study an algorithmic model for wireless ad hoc and sensor networks that aims to be sufficiently close to reality as to represent practical realworld networks whi...
Fabian Kuhn, Aaron Zollinger
PERCOM
2003
ACM
15 years 9 months ago
Dynamic Bandwidth Management for Single-Hop Ad Hoc Wireless Networks
Distributed weighted fair scheduling schemes for QoS support in wireless networks have not yet become standard. In this paper we propose an Admission Control and Dynamic Bandwidth...
Samarth H. Shah, Kai Chen, Klara Nahrstedt