Sciweavers

138 search results - page 7 / 28
» Packet forwarding with source verification
Sort
View
CEC
2007
IEEE
15 years 1 months ago
Preventing selfish behavior in Ad Hoc networks
Cooperation enforcement is one of the key issues in ad hoc networks. In this paper we proposes a new strategy driven approach that aims at discouraging selfish behavior among netwo...
Marcin Seredynski, Pascal Bouvry, Mieczyslaw A. Kl...
73
Voted
PCI
2005
Springer
15 years 3 months ago
Reliable Transmission Using Intermediate Sink or Source Nodes in Sensor Networks
The main resarch in sensor networks has been focused on minimizing power consumption of sensors to maximize network life time. In some critical applications, however, the most impo...
Bo-Hyung Lee, Hyung-Wook Yoon, Jongho Park, Min Yo...
MOBICOM
2000
ACM
15 years 1 months ago
GPSR: greedy perimeter stateless routing for wireless networks
We present Greedy Perimeter Stateless Routing (GPSR), a novel routing protocol for wireless datagram networks that uses the positions of routers and a packet’s destination to ma...
Brad Karp, H. T. Kung
SIGMETRICS
2011
ACM
139views Hardware» more  SIGMETRICS 2011»
14 years 12 days ago
Slick packets
Source-controlled routing has been proposed as a way to improve flexibility of future network architectures, as well as simplifying the data plane. However, if a packet specifie...
Giang T. K. Nguyen, Rachit Agarwal, Junda Liu, Mat...
WIMOB
2007
IEEE
15 years 3 months ago
Routing Packets into Wireless Mesh Networks
— Wireless mesh networks are a promising way to provide Internet access to fixed and mobile wireless devices. In mesh networks, traffic between mesh nodes and the Internet is r...
Rainer Baumann, Simon Heimlicher, Vincent Lenders,...