Sciweavers

908 search results - page 102 / 182
» Modeling vulnerabilities of ad hoc routing protocols
Sort
View
NAS
2010
IEEE
14 years 10 months ago
CR: Capability Information for Routing of Wireless Ad Hoc Networks in the Real Environment
—In greedy routing, each relay node forwards the message to a neighbor (also called successor) that is closer to the destination. However, the successor candidate set (SCS) is di...
Zhen Jiang, Zhigang Li, Nong Xiao, Jie Wu
ADHOCNOW
2006
Springer
15 years 5 months ago
A Classification and Performance Comparison of Mobility Models for Ad Hoc Networks
In mobile ad hoc network research, simulation plays an important role in determining the network characteristics and measuring performance. On the other hand, unrealistic simulatio...
Emre Atsan, Öznur Özkasap
TMM
2011
160views more  TMM 2011»
14 years 6 months ago
Routing-Aware Multiple Description Video Coding Over Mobile Ad-Hoc Networks
Abstract—Supporting video transmission over error-prone mobile ad-hoc networks is becoming increasingly important as these networks become more widely deployed. We propose a rout...
Yiting Liao, Jerry D. Gibson
ICDCSW
2009
IEEE
15 years 6 months ago
A Straightforward Path Routing in Wireless Ad Hoc Sensor Networks
Building a “Straightforward” path in wireless ad hoc sensor networks (WASNs) not only avoids wasting energy in detours, but also incurs less interference in other transmission...
Zhen Jiang, Junchao Ma, Wei Lou, Jie Wu
ICWN
2003
15 years 1 months ago
Performance of Mobile Ad Hoc Network in Constrained Mobility Pattern
Mobile Ad Hoc Networks (MANET) performance is affected by a number of factors, eg. speed, node density. In this paper we will focus on the effect of constrained mobility on the per...
Bu-Sung Lee, Kai Juan Wong, Boon-Chong Seet, Lijua...