Sciweavers

908 search results - page 118 / 182
» Modeling vulnerabilities of ad hoc routing protocols
Sort
View
IWCMC
2006
ACM
15 years 5 months ago
Priority-based receiver-side relay election in wireless ad hoc sensor networks
Receiver-side relay election has been recently proposed as an alternative to transmitter-side relay selection in wireless ad hoc networks. In this paper we study different priori...
Komlan Egoh, Swades De
TWC
2008
245views more  TWC 2008»
14 years 11 months ago
Cross-Layer Optimal Policies for Spatial Diversity Relaying in Mobile Ad Hoc Networks
In order to adapt to time-varying wireless channels, various channel-adaptive schemes have been proposed to exploit inherent spatial diversity in mobile/wireless ad hoc networks w...
Jing Ai, Alhussein A. Abouzeid, Zhenzhen Ye
ECUMN
2007
Springer
15 years 6 months ago
Approach for Reducing Control Packets in AODV-Based MANETs
Movements of nodes in MANETs result in route changes, thus requiring the transmission of control packets. As MANETs have limited resources, it is important to reduce the number of...
David Espes, Cédric Teyssié
ICC
2007
IEEE
124views Communications» more  ICC 2007»
15 years 6 months ago
Emulating End-to-End Losses and Delays for Ad Hoc Networks
— Ad hoc networks have gained place in the research area recently. There are many researches regarding different topics related to such networks, such as routing, media access co...
Alaa Seddik-Ghaleb, Yacine Ghamri-Doudane, Sidi-Mo...
PEWASUN
2004
ACM
15 years 5 months ago
Multipath routing and multiple description coding in ad-hoc networks: a simulation study
The nature of ad hoc networks makes it a challenge to offer connections with an assured quality. In order to improve the performance of the network, multipath routing in combinati...
Irene Fernández Díaz, Dick H. J. Epe...