Sciweavers

2691 search results - page 171 / 539
» Securing Ad Hoc Networks
Sort
View
SAC
2008
ACM
15 years 4 months ago
Publish/subscribe architecture for mobile ad hoc networks
Publish/Subscribe architectures have been widely studied and applied in wired networks. However, their deployment on mobile ad hoc networks still presents a lot of challenges. Thi...
Cristiano G. Rezende, Bruno P. S. Rocha, Antonio A...
171
Voted
MATA
2000
Springer
137views Communications» more  MATA 2000»
15 years 8 months ago
Topology Discovery in Ad Hoc Wireless Networks Using Mobile Agents
Extensive research on mobile agents has been rife with the growing interests in network computing. In this paper, we have discussed a mobile multi-agent-based framework to address ...
Romit Roy Choudhury, Somprakash Bandyopadhyay, Kri...
WONS
2005
IEEE
15 years 10 months ago
Co-operative Downloading in Vehicular Ad-Hoc Wireless Networks
Increasing need for people to be “connected”; while at the same time remain as mobile as ever poses several interesting issues in wireless networks. It is conceivable in the n...
Alok Nandan, Shirshanka Das, Giovanni Pau, Mario G...
WIOPT
2010
IEEE
15 years 3 months ago
Effect of limited topology knowledge on opportunistic forwarding in ad hoc wireless networks
—Opportunistic forwarding is a simple scheme for packet routing in ad hoc wireless networks such as duty cycling sensor networks in which reducing energy consumption is a princip...
Prithwish Basu, Saikat Guha
MOBIHOC
2008
ACM
16 years 4 months ago
An approximation algorithm for conflict-aware broadcast scheduling in wireless ad hoc networks
Broadcast scheduling is a fundamental problem in wireless ad hoc networks. The objective of a broadcast schedule is to deliver a message from a given source to all other nodes in ...
Reza Mahjourian, Feng Chen, Ravi Tiwari, My T. Tha...