Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content excha...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
Abstract. We developed a reliable mobile Peer-to-Peer (P2P) data sharing system and performed some experiments for verifying our routing scheme using our real testbed. Our method f...
Mee Young Sung, Jong Hyuk Lee, Jong Seung Park, Se...
— We propose an algorithm for design and on the fly modification of the schedule of a wireless ad hoc network for provision of fair service guarantees under topological changes...
— The goal of this research is to simulate and analyze an Inter-Vehicle Communication (IVC) Mobile Ad hoc Network (MANET). Automobiles of the future will take advantage of IVC ca...
Jason D. Watson, Mark Pellerito, Charlie Gladden, ...
GLS is a new distributed location service which tracks mobile node locations. GLS combined with geographic forwarding allows the construction of ad hoc mobile networks that scale ...
Jinyang Li, John Jannotti, Douglas S. J. De Couto,...