Sciweavers

908 search results - page 108 / 182
» Modeling vulnerabilities of ad hoc routing protocols
Sort
View
ICDCS
2005
IEEE
15 years 5 months ago
Handling Asymmetry in Power Heterogeneous Ad Hoc Networks: A Cross Layer Approach
Power heterogeneous ad hoc networks are characterized by link layer asymmetry: the ability of lower power nodes to receive transmissions from higher power nodes but not vice versa...
Vasudev Shah, Srikanth V. Krishnamurthy
FSTTCS
2009
Springer
15 years 6 months ago
Algorithms for Message Ferrying on Mobile ad hoc Networks
ABSTRACT. Message Ferrying is a mobility assisted technique for working around the disconnectedness and sparsity of Mobile ad hoc networks. One of the important questions which ari...
Mostafa H. Ammar, Deeparnab Chakrabarty, Atish Das...
TMC
2008
134views more  TMC 2008»
14 years 11 months ago
A Hybrid Token-CDMA MAC Protocol for Wireless Ad Hoc Networks
Token passing medium access control (MAC) protocols are gaining interest amongst wireless ad hoc network researchers as they provide unrivalled advantages over the existing IEEE 80...
I-Sheng Liu, Fambirai Takawira, Hong-Jun Xu
CN
2010
103views more  CN 2010»
14 years 12 months ago
Continuum equilibria and global optimization for routing in dense static ad hoc networks
We consider massively dense ad hoc networks and study their continuum limits as the node density increases and as the graph providing the available routes becomes a continuous area...
Alonso Silva, Eitan Altman, Pierre Bernhard, M&eac...
ICC
2009
IEEE
147views Communications» more  ICC 2009»
15 years 6 months ago
A Distributed Protocol for Virtual Device Composition in Mobile Ad Hoc Networks
— The dynamic composition of systems of networked appliances, or virtual devices, in MANETs, enables users to generate, on-the-fly, complex strong specific systems. Current work ...
Eric Karmouch, Amiya Nayak