Sciweavers

908 search results - page 159 / 182
» Modeling vulnerabilities of ad hoc routing protocols
Sort
View
IWCMC
2006
ACM
15 years 3 months ago
Performance of Taroko: a cluster-based addressing and routing scheme for self-organized networks
Self-Organized Networks (SONs) are a general description of autonomous networks without infrastructure, of which Ad Hoc, Sensor and Mesh networks are special cases. We had previou...
Julien Ridoux, Meriem Kassar, Mathias Boc, Anne Fl...
117
Voted
SIGCOMM
1994
ACM
15 years 1 months ago
Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for mobile computers
An ad-hoc network is the cooperative engagement of a collection of Mobile Hosts without the required intervention of any centralized Access Point. In this paper we present an inno...
Charles E. Perkins, Pravin Bhagwat
78
Voted
PEWASUN
2006
ACM
15 years 3 months ago
Performance evaluation of backoff algorithms in 802.11 ad-hoc networks
Understanding the performance of backoff algorithms in multihop ad hoc networks is a key feature to design efficient Medium Access Protocols for wireless networks. The 802.11 bac...
Tahiry Razafindralambo, Fabrice Valois
MASS
2010
140views Communications» more  MASS 2010»
14 years 7 months ago
InterMR: Inter-MANET routing in heterogeneous MANETs
The advancements of diverse radio technologies and emerging applications have spawned increasing heterogeneity in mobile ad hoc networks (MANETs). But the collaborative nature of c...
Seung-Hoon Lee, Starsky H. Y. Wong, Chi-Kin Chau, ...
ICCCN
2007
IEEE
15 years 3 months ago
Optimization Models for Streaming in Multihop Wireless Networks
— Wireless spectrum is a scare resource, while media streaming usually requires high end-to-end bandwidth. Media streaming in wireless ad hoc networks is therefore a particularly...
Zongpeng Li, Baochun Li, Mea Wang