Sciweavers

799 search results - page 107 / 160
» Power Control and Clustering in Ad Hoc Networks
Sort
View
INFOCOM
2010
IEEE
14 years 8 months ago
From Time Domain to Space Domain: Detecting Replica Attacks in Mobile Ad Hoc Networks
—A common vulnerability of wireless networks, in particular, the mobile ad hoc network (MANET), is their susceptibility to node compromise/physical capture attacks since the wire...
Kai Xing, Xiuzhen Cheng
INFOCOM
2010
IEEE
14 years 8 months ago
Throughput, Delay, and Mobility in Wireless Ad Hoc Networks
—Throughput capacity in wireless ad hoc networks has been studied extensively under many different mobility models such as i.i.d. mobility model, Brownian mobility model, random ...
Pan Li, Yuguang Fang, Jie Li
VTC
2010
IEEE
185views Communications» more  VTC 2010»
14 years 7 months ago
Fuzzy Logic Aided Dynamic Source Routing in Cross-Layer Operation Assisted Ad Hoc Networks
1The classic Dynamic Source Routing (DSR) protocol opts for the route requiring the lowest number of hops for transmitting data from the source to the destination. However, owing t...
Jing Zuo, Soon Xin Ng, Lajos Hanzo
MOBIHOC
2005
ACM
15 years 9 months ago
Link-layer salvaging for making routing progress in mobile ad hoc networks
IEEE 802.11 MAC, called the Distributed Coordination Function (DCF), employs carrier sensing to effectively avoid collisions, but this makes it difficult to maximally reuse the sp...
Chansu Yu, Kang G. Shin, Lubo Song
WOWMOM
2005
ACM
132views Multimedia» more  WOWMOM 2005»
15 years 3 months ago
Comparisons of Inter-Domain Routing Schemes for Heterogeneous Ad Hoc Networks
— In this paper, we propose three interdomain routing schemes for communications between different ad-hoc groups (subnets), namely the implicit foreign degree based (IFD), the ex...
Wenbin Ma, Mooi Choo Chuah