Sciweavers

1624 search results - page 8 / 325
» Requirements for Privacy-Enhancements in Mobile Ad Hoc Netwo...
Sort
View
GECCO
2005
Springer
15 years 4 months ago
Optimizing parameters of a mobile ad hoc network protocol with a genetic algorithm
Mobile ad hoc networks are typically designed and evaluated in generic simulation environments. However the real conditions in which these networks are deployed can be quite diff...
David J. Montana, Jason Redi
MOBIHOC
2002
ACM
15 years 10 months ago
Directional virtual carrier sensing for directional antennas in mobile ad hoc networks
This paper presents a new carrier sensing mechanism called DVCS (Directional Virtual Carrier Sensing) for wireless communication using directional antennas. DVCS does not require ...
Mineo Takai, Jay Martin, Rajive Bagrodia, Aifeng R...
WOWMOM
2005
ACM
201views Multimedia» more  WOWMOM 2005»
15 years 4 months ago
Real-Time Intrusion Detection for Ad Hoc Networks
A mobile ad hoc network is a collection of nodes that is connected through a wireless medium forming rapidly changing topologies. The widely accepted existing routing protocols de...
Ioanna Stamouli, Patroklos G. Argyroudis, Hitesh T...
MONET
2002
128views more  MONET 2002»
14 years 10 months ago
MARE: Resource Discovery and Configuration in Ad Hoc Networks
The emergence of personal portable devices, such as PDA's and Mobile phones, with considerable processing and communication capabilities, has led to a desire to use various co...
Matt Storey, Gordon S. Blair, Adrian Friday
105
Voted
VTC
2010
IEEE
185views Communications» more  VTC 2010»
14 years 9 months ago
Fuzzy Logic Aided Dynamic Source Routing in Cross-Layer Operation Assisted Ad Hoc Networks
1The classic Dynamic Source Routing (DSR) protocol opts for the route requiring the lowest number of hops for transmitting data from the source to the destination. However, owing t...
Jing Zuo, Soon Xin Ng, Lajos Hanzo