Sciweavers

1862 search results - page 265 / 373
» Secure Routing for Mobile Ad Hoc Networks
Sort
View
83
Voted
ADHOC
2007
104views more  ADHOC 2007»
15 years 29 days ago
Performance benchmarking of wireless Web servers
ct 8 The advent of mobile computers and wireless networks enables the deployment of wireless Web servers and clients in 9 short-lived ad hoc network environments, such as classroom...
Guangwei Bai, Kehinde Oladosu, Carey L. Williamson
108
Voted
MOBIHOC
2003
ACM
16 years 12 days ago
The shared wireless infostation model: a new ad hoc networking paradigm (or where there is a whale, there is a way)
In wireless ad hoc networks, capacity can be traded for delay. This tradeoff has been the subject of a number of studies, mainly concentrating on the two extremes: either minimizi...
Tara Small, Zygmunt J. Haas
108
Voted
MOBICOM
2003
ACM
15 years 6 months ago
Trajectory based forwarding and its applications
Trajectory based forwarding (TBF) is a novel method to forward packets in a dense ad hoc network that makes it possible to route a packet along a predefined curve. It is a genera...
Dragos Niculescu, Badri Nath
ICUIMC
2011
ACM
14 years 4 months ago
Overhead analysis of query localization optimization and routing
Query localization is an improved extension of on-demand routing protocols for ad hoc networks. It makes use of prior routing histories to localize the query flood to a limited re...
Wenzheng Xu, Yongmin Zhang, Weifa Liang
INFOCOM
2003
IEEE
15 years 6 months ago
Ad Hoc Positioning System (APS) Using AOA
— Position information of individual nodes is useful in implementing functions such as routing and querying in ad-hoc networks. Deriving position information by using the capabil...
Dragos Niculescu, B. R. Badrinath