Sciweavers

2691 search results - page 167 / 539
» Securing Ad Hoc Networks
Sort
View
MSWIM
2006
ACM
15 years 11 months ago
The effect of the radio wave propagation model in mobile ad hoc networks
The simulation of wireless networks has been an important tool for researchers and the industry in the last years. Especially in the field of Mobile Ad Hoc Networking, most curre...
Arne Schmitz, Martin Wenig
ICPPW
2002
IEEE
15 years 10 months ago
Statistical Analysis of Connectivity in Unidirectional Ad Hoc Networks
A unidirectional link exists in an ad-hoc network when a node B is within the transmission range of another node A while node A cannot directly hear node B. However, a reverse rou...
Venugopalan Ramasubramanian, Daniel Mossé
205
Voted
CIIT
2007
195views Communications» more  CIIT 2007»
15 years 6 months ago
Using a cache scheme to detect selfish nodes in mobile ad hoc networks
This paper presents a hardware based cache scheme to detect selfish nodes in mobile ad hoc network. In this scheme, the hardware monitors the activities of the upperlayer software...
H. Lin, José G. Delgado-Frias, Sirisha Medi...
ICWN
2004
15 years 6 months ago
Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways
- Mobile ad hoc networks allow mobile nodes to communicate with one another without the aid of infrastructure thus forming temporary networks on the fly. While such networks are ga...
Shiv Mehra, Chansu Yu
160
Voted
MASCOTS
2004
15 years 6 months ago
On Mobility-Capacity-Delay Trade-off in Wireless Ad Hoc Networks
We show that there is a trade off among mobility, capacity, and delay in ad hoc networks. More specifically, we consider two schemes for mobility of nodes in ad hoc networks. We d...
Renato M. de Moraes, Hamid R. Sadjadpour, Jose Joa...