Sciweavers

1862 search results - page 43 / 373
» Routing and Security in Mobile Ad Hoc Networks
Sort
View
PIMRC
2010
IEEE
14 years 9 months ago
Self-optimizing routing in MANETs with multi-class flows
In this paper we show how game theory and Gibbs sampling techniques can be used to design a self-optimizing algorithm for minimizing end-to-end delays for all flows in a multi-clas...
Pierre Coucheney, Bruno Gaujal, Corinne Touati
ISCAPDCS
2003
15 years 22 days ago
Performance of a Jini-based Ad Hoc Network Authentication Scheme
Ad hoc networks provide a dynamically reconfigurable network infrastructure where entities can participate at will. Jini technology can be used to implement an ad hoc network, and...
M. M. McMahon, D. M. Needham, J. B. Datko
MOBIHOC
2003
ACM
15 years 11 months ago
SHORT: self-healing and optimizing routing techniques for mobile ad hoc networks
On demand routing protocols provide scalable and costeffective solutions for packet routing in mobile wireless ad hoc networks. The paths generated by these protocols may deviate ...
Chao Gui, Prasant Mohapatra
VTC
2010
IEEE
185views Communications» more  VTC 2010»
14 years 9 months ago
Fuzzy Logic Aided Dynamic Source Routing in Cross-Layer Operation Assisted Ad Hoc Networks
1The classic Dynamic Source Routing (DSR) protocol opts for the route requiring the lowest number of hops for transmitting data from the source to the destination. However, owing t...
Jing Zuo, Soon Xin Ng, Lajos Hanzo
ICPPW
2002
IEEE
15 years 4 months ago
Infrastructured Ad Hoc Networks
In traditional ad hoc networks, all nodes are considered equal and take equal part in the routing and forwarding of packets. We believe that this may not always be desirable. Rath...
Anders Lindgren, Olov Schelén