Sciweavers

1624 search results - page 81 / 325
» Requirements for Privacy-Enhancements in Mobile Ad Hoc Netwo...
Sort
View
ISCC
2002
IEEE
169views Communications» more  ISCC 2002»
15 years 6 months ago
Congestion controlled adaptive lightweight multicast in wireless mobile ad hoc networks
The use of contention-based MAC protocols combined with hidden terminal problems make multi-hop wireless ad hoc networks much more sensitive to load and congestion than wired netw...
Ken Tang, Katia Obraczka, Sung-Ju Lee, Mario Gerla
VALUETOOLS
2006
ACM
112views Hardware» more  VALUETOOLS 2006»
15 years 7 months ago
Performance of ad hoc networks with two-hop relay routing and limited packet lifetime
— Considered is a mobile ad hoc network consisting of three types of nodes (source, destination and relay nodes) and using the two-hop relay routing protocol. Packets at relay no...
Ahmad Al Hanbali, Philippe Nain, Eitan Altman
ICC
2009
IEEE
139views Communications» more  ICC 2009»
14 years 11 months ago
Non Disruptive Data Services Towards Real-Time Traffic in Wireless Ad Hoc Networks
Abstract--Mobile wireless Ad hoc NETworks (MANETs) naturally support a traffic mix of elastic and real-time flows but the shared nature and lossy properties of the radio medium mak...
Jeremie Leguay, Hicham Khalife, Georgios Sotiropou...
MASCOTS
2003
15 years 2 months ago
Multipath Routing in Mobile Ad Hoc Networks: Issues and Challenges
Mobile ad hoc networks (MANETs) consist of a collection of wireless mobile nodes which dynamically exchange data among themselves without the reliance on a fixed base station or a...
Stephen Mueller, Rose P. Tsang, Dipak Ghosal
ADHOC
2007
73views more  ADHOC 2007»
15 years 1 months ago
A survey on real-world implementations of mobile ad-hoc networks
Simulation and emulation are valuable techniques for the evaluation of algorithms and protocols used in mobile ad-hoc networks. However, these techniques always require the simpli...
Wolfgang Kieß, Martin Mauve