Sciweavers

1378 search results - page 107 / 276
» Programming in mobile ad hoc networks
Sort
View
MOBIQUITOUS
2005
IEEE
15 years 7 months ago
Multi-path Admission Control for Mobile Ad hoc Networks
As wireless networks become more prevalent, users will demand the same applications that are currently available in wired networks. Further, they will expect to receive a quality ...
Anders Lindgren, Elizabeth M. Belding-Royer
121
Voted
MOBIHOC
2001
ACM
16 years 1 months ago
A comparison of TCP performance over three routing protocols for mobile ad hoc networks
We examine the performance of the TCP protocol for bulkdata transfers in mobile ad hoc networks (MANETs). We vary the number of TCP connections and compare the performances of thr...
Thomas D. Dyer, Rajendra V. Boppana
147
Voted
ICC
2009
IEEE
135views Communications» more  ICC 2009»
14 years 11 months ago
Load Aware Broadcast in Mobile Ad Hoc Networks
In a wireless ad hoc network, the main issue of a good broadcast protocol is to attain maximum reachability with minimal packet forwarding. Existing protocols address this issue by...
Md. Tanvir Al Amin, Sukarna Barua, Sudip Vhaduri, ...
121
Voted
ADHOCNOW
2006
Springer
15 years 7 months ago
Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks
Recently, identity-based cryptographic (IBC) schemes have been considered to secure mobile ad hoc networks (MANETs) due to their efficient key management properties. However, propo...
Katrin Hoeper, Guang Gong
INFOCOM
2010
IEEE
15 years 7 days ago
From Time Domain to Space Domain: Detecting Replica Attacks in Mobile Ad Hoc Networks
—A common vulnerability of wireless networks, in particular, the mobile ad hoc network (MANET), is their susceptibility to node compromise/physical capture attacks since the wire...
Kai Xing, Xiuzhen Cheng