Sciweavers

908 search results - page 134 / 182
» Modeling vulnerabilities of ad hoc routing protocols
Sort
View
IJAHUC
2008
80views more  IJAHUC 2008»
14 years 11 months ago
Performance evaluation of node density-based adaptive routing scheme for disruption tolerant networks
: Traditional ad hoc routing protocols do not work in intermittently connected networks since end-to-end paths may not exist in such networks. Hence, routing mechanisms that can wi...
Mooi Choo Chuah, Peng Yang
NETWORKING
2007
15 years 1 months ago
On-Demand Routing in Disrupted Environments
While current on-demand routing protocols are optimized to take into account unique features of mobile ad hoc networks (MANETs) such as frequent topology changes and limited batter...
Jay Boice, J. J. Garcia-Luna-Aceves, Katia Obraczk...
TMC
2010
193views more  TMC 2010»
14 years 10 months ago
Quantifying Impact of Mobility on Data Availability in Mobile Ad Hoc Networks
—In mobile ad hoc networks, there are many applications in which mobile users share information, e.g., collaborative rescue operations at a disaster site and exchange of word-of-...
Takahiro Hara
PEWASUN
2004
ACM
15 years 5 months ago
A simulation study on multi-rate mobile ad hoc networks
This paper studies the performance of a multi-rate mobile ad hoc network (MANET) using an extended ns-2 simulator. A link adaptation algorithm is developed and tested. The multi-r...
Gang Ding, Xiaoxin Wu, Bharat K. Bhargava
CISS
2008
IEEE
15 years 6 months ago
Distributed power control in wireless ad hoc networks using message passing: Throughput optimality and network utility maximizat
— This paper presents an algorithm for distributed power control and scheduling over wireless ad hoc-networks, where the data rate on each link depends on the transmission power ...
Aneesh Reddy, Sanjay Shakkottai, Lei Ying