Sciweavers

1624 search results - page 219 / 325
» Requirements for Privacy-Enhancements in Mobile Ad Hoc Netwo...
Sort
View
WOWMOM
2006
ACM
135views Multimedia» more  WOWMOM 2006»
15 years 7 months ago
A MAC Layer Protocol for Priority-based Reliable Multicast in Wireless Ad Hoc Networks
RTS-CTS handshake based protocols achieve “reliable unicast” by eliminating the hidden node problem effectively, however, these solutions are not directly or efficiently gene...
Murat Demirbas, Muzammil Hussain
ADHOCNETS
2009
Springer
15 years 8 months ago
Improved Topology Control Algorithms for Simple Mobile Networks
Topology control is the problem of assigning powers to the nodes of an ad hoc network so as to create a specified network topology while minimizing the energy consumed by the netw...
Fei Che, Errol L. Lloyd, Liang Zhao
CORR
2007
Springer
88views Education» more  CORR 2007»
15 years 1 months ago
Augmented Tree-based Routing Protocol for Scalable Ad Hoc Networks
—In ad hoc networks scalability is a critical requirement if these technologies have to reach their full potential. Most of the proposed routing protocols do not operate efficien...
Marcello Caleffi, Giancarlo Ferraiuolo, Luigi Paur...
127
Voted
ICWN
2004
15 years 3 months ago
An Architecture Supporting Run-Time Upgrade of Proxy-Based Services in Ad Hoc Networks
Abstract-- In the proxy approach to Service Oriented Computing, a service advertises a proxy, which is searched for, retrieved and used by interested clients as a local handle to t...
Rohan Sen, Radu Handorean, Gregory Hackmann, Gruia...
INFOCOM
2005
IEEE
15 years 7 months ago
Routing in ad hoc networks: a theoretical framework with practical implications
— In this paper, information theoretic techniques are used to derive analytic expressions for the minimum expected length of control messages exchanged by proactive routing in a ...
Nianjun Zhou, Alhussein A. Abouzeid