Sciweavers

1862 search results - page 313 / 373
» Routing and Security in Mobile Ad Hoc Networks
Sort
View
ICC
2009
IEEE
190views Communications» more  ICC 2009»
14 years 9 months ago
Low Bound of Energy-Latency Trade-Off of Opportunistic Routing in Multi-Hop Networks
During the last decade, many works were devoted to improving the performance of relaying techniques in ad hoc networks. One promising approach consists in allowing the relay nodes ...
Ruifeng Zhang, Jean-Marie Gorce, Katia Jaffr&egrav...
INTERSENSE
2006
ACM
15 years 5 months ago
Particle-based methodology for representing mobile ad-hoc networks
—We present a methodology based on physics laws and particles in order to represent, simulate, and architect advanced networking models. We introduce a mathematical formalism wit...
Carlos J. Martinez, Marisa López, Luis C. E...
JCM
2010
126views more  JCM 2010»
14 years 10 months ago
Adding Redundancy to Replication in Window-aware Delay-tolerant Routing
— This paper presents a resource-efficient protocol for opportunistic routing in delay-tolerant networks (DTN). First, our approach exploits the context of mobile nodes (speed, ...
Gabriel Sandulescu, Simin Nadjm-Tehrani
LCN
2002
IEEE
15 years 4 months ago
A First Look at Wired Sensor Networks for Video Surveillance Systems
Sensor networks are a major new area of research. Some sensor applications, such as video surveillance, will need to be tethered for reasons of bandwidth and power requirements. T...
Vijay Chandramohan, Kenneth J. Christensen
CNSR
2008
IEEE
130views Communications» more  CNSR 2008»
15 years 1 months ago
Could Proactive Link-State Routed Wireless Networks Benefit from Local Fast Reroute?
The communication performance in wireless networks is often heavily influenced by failures caused by node mobility and radio disturbance. Proactive linkstate routing protocols lik...
Audun Fosselie Hansen, Geir Egeland, Paal Engelsta...