: The fact that security is a critical problem when implementing mobile ad hoc networks (MANETs) is widely acknowledged. One of the different kinds of misbehavior a node may exhibi...
Frank Kargl, Andreas Klenk, Michael Weber, Stefan ...
— Multi-hop wireless ad-hoc networks are drawing more and more attention from both academic and industrial research. The lack of infrastructure makes those networks easy to deplo...
Position based routing algorithms use the knowledge of the position of nodes for routing of packets in mobile ad-hoc networks. Previously proposed position based routing algorithms...
—The publish/subscribe (pub/sub for short) paradigm is used to deliver events from a source to interested clients in an asynchronous way. Recently, extending a pub/sub system in ...
We propose a new routing graph, the Restricted Delaunay Graph (RDG), for ad hoc networks. Combined with a node clustering algorithm, RDG can be used as an underlying graph for geo...
Jie Gao, Leonidas J. Guibas, John Hershberger, Li ...