Sciweavers

908 search results - page 125 / 182
» Modeling vulnerabilities of ad hoc routing protocols
Sort
View
IFIP
2004
Springer
15 years 5 months ago
Activity-Based User Modeling in Service-Oriented Ad-Hoc-Networks
Wireless network research still lacks methods to integratively evaluate the performance that can be expected from application layer protocols. The user behavior is predominantly aļ...
Tobias Breyer, Michael Klein, Philipp Obreiter, Bi...
TWC
2011
367views more  TWC 2011»
14 years 6 months ago
Improving the Performance of Wireless Ad Hoc Networks Through MAC Layer Design
—In this paper, the performance of the ALOHA and CSMA MAC protocols are analyzed in spatially distributed wireless networks. The main system objective is correct reception of pac...
Mariam Kaynia, Nihar Jindal, Geir E. Øien
ICCCN
2007
IEEE
15 years 6 months ago
k-hop Backbone Formation in Ad Hoc Networks
—Several recent research activities have started to recognize the relevant role of k-hop clustering in Mobile Ad hoc NETworks (MANET) to effectively support many relevant tasks, ...
Paolo Bellavista, Eugenio Magistretti
MOBICOM
2006
ACM
15 years 5 months ago
Component based channel assignment in single radio, multi-channel ad hoc networks
In this paper, we consider the channel assignment problem in single radio multi-channel mobile ad-hoc networks. Specifically, we investigate the granularity of channel assignment...
Ramanuja Vedantham, Sandeep Kakumanu, Sriram Laksh...
WONS
2005
IEEE
15 years 5 months ago
A Partition Prediction Algorithm for Service Replication in Mobile Ad Hoc Networks
Due to the mobility of nodes in Ad hoc networks, network topology is dynamic and unpredictable, which leads to frequent network partitioning. This partitioning disconnects many no...
Abdelouahid Derhab, Nadjib Badache, Abdelmadjid Bo...