Sciweavers

908 search results - page 117 / 182
» Modeling vulnerabilities of ad hoc routing protocols
Sort
View
ENGL
2006
70views more  ENGL 2006»
14 years 12 months ago
Strategies for Service Discovery over Ad Hoc Networks
Service discovery is an important and necessary component of ad hoc networks. To fit within the context of such networks, a post-query model with several service discovery strateg...
Michel Barbeau, Evangelos Kranakis, Honghui Luo
ICC
2007
IEEE
136views Communications» more  ICC 2007»
15 years 6 months ago
Cross-layer Networking for Peer Databases over Wireless Ad-Hoc Communities
— Recent advances in wireless technology as well as in electronics industry have given rise to the widespread of wireless ad-hoc networking. Expanding data-centric applications t...
Evangelos Papapetrou, Efthymia Rova, Apostolos Zar...
IPPS
2008
IEEE
15 years 6 months ago
Middleware support for delay-tolerant service provision in disconnected mobile ad hoc networks
The service-oriented approach is known to be adequate for building distributed applications for mobile ad hoc networks, and a number of successful research works using this approa...
Yves Mahéo, Romeo Said, Frédé...
WCNC
2008
IEEE
15 years 6 months ago
Estimation of Link Quality and Residual Time in Vehicular Ad Hoc Networks
—High node mobility and transient connectivity in Vehicular Ad Hoc NETworks have introduced numerous challenges in the design of efficient communication protocols for these netwo...
Nikoletta Sofra, Kin K. Leung
AINA
2009
IEEE
15 years 6 months ago
Opportunistic Routing for Disruption Tolerant Networks
—Opportunistic networks represent one of the most interesting evolution of MANET paradigm. Generally speaking, opportunistic networks enable user communication in environments wh...
Marcello Caleffi, Luigi Paura