Sciweavers

1080 search results - page 69 / 216
» Performance analysis of the CONFIDANT protocol
Sort
View
ALGOSENSORS
2007
Springer
15 years 4 months ago
Asynchronous Training in Wireless Sensor Networks
Scalable energy-efficient training protocols are proposed for massively-deployed sensor networks, where sensors are initially anonymous and unaware of their location. The protocol...
Ferruccio Barsi, Alan A. Bertossi, Francesco Betti...
FASE
2008
Springer
14 years 11 months ago
Automated Analysis of Permission-Based Security Using UMLsec
Abstract. To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems' resources. These permissions enf...
Jan Jürjens, Jörg Schreck, Yijun Yu
PERCOM
2003
ACM
15 years 3 months ago
Study of Distance Vector Routing Protocols for Mobile Ad Hoc Networks
We investigate the performance issues of destinationsequenced distance vector (DSDV) and ad-hoc on-demand distance vector (AODV) routing protocols for mobile ad hoc networks. Four...
Yi Lu, Weichao Wang, Yuhui Zhong, Bharat K. Bharga...
IJIPT
2008
191views more  IJIPT 2008»
14 years 10 months ago
ARPM: Agent-based Routing Protocol for MANET
Mobile ad-hoc networks (MANETs) are infrastructure-less networks where no central network management exists, composed of mobile nodes over wireless links. Network topology in MANE...
Helen Bakhsh, Manal Abdullah
CEE
2010
86views more  CEE 2010»
14 years 10 months ago
Scalability of MANET routing protocols for heterogeneous and homogenous networks
In Mobile Ad hoc Network (MANET), mobility, traffic and node density are main network conditions that significantly affect the performance of routing protocols. Much of the previou...
Huda AlAmri, Mehran Abolhasan, Tadeusz A. Wysocki