Sciweavers

2691 search results - page 143 / 539
» Securing Ad Hoc Networks
Sort
View
ICT
2004
Springer
127views Communications» more  ICT 2004»
15 years 10 months ago
An Interference Avoidance Technique for Ad Hoc Networks Employing Array Antennas
Array antennas have the potential to increase the capacity of wireless networks, but a distributed beamforming algorithm for maximizing the capacity in asynchronous, decentralized ...
T. Hunziker, Jacir Luiz Bordim, T. Ohira, Shinsuke...
189
Voted
DSN
2004
IEEE
15 years 8 months ago
Cluster-Based Failure Detection Service for Large-Scale Ad Hoc Wireless Network Applications
The growing interest in ad hoc wireless network applications that are made of large and dense populations of lightweight system resources calls for scalable approaches to fault to...
Ann T. Tai, Kam S. Tso, William H. Sanders
ASMTA
2008
Springer
100views Mathematics» more  ASMTA 2008»
15 years 7 months ago
A Tandem Queueing Model for Delay Analysis in Disconnected Ad Hoc Networks
Ad hoc network routing protocols may fail to operate in the absence of an end-to-end connection from source to destination. This deficiency can be resolved by so-called delay-toler...
Ahmad Al Hanbali, Roland de Haan, Richard J. Bouch...
JCO
2006
101views more  JCO 2006»
15 years 4 months ago
Energy conservation through resource-aware movement in heterogeneous mobile ad hoc networks
Abstract Energy conservation in mobile ad hoc networks is of paramount importance because most mobile nodes usually have very limited energy supply. Previous research on this issue...
Wei Liu, Yanchao Zhang, Yuguang Fang, Kejie Lu
ADHOC
2004
100views more  ADHOC 2004»
15 years 4 months ago
Position and orientation in ad hoc networks
Position and orientation information of individual nodes in ad hoc networks is useful for both service and application implementation. Services that can be enabled by availability...
Dragos Niculescu, Badri Nath