Sciweavers

2691 search results - page 172 / 539
» Securing Ad Hoc Networks
Sort
View
164
Voted
SENSYS
2003
ACM
15 years 10 months ago
Model-based compression in wireless ad hoc networks
We present a technique for compression of shortest paths routing tables for wireless ad hoc networks. The main characteristic of such networks is that geographic location of nodes...
Milenko Drinic, Darko Kirovski, Miodrag Potkonjak
INFOCOM
2002
IEEE
15 years 10 months ago
Gossip-based ad hoc routing
— Many ad hoc routing protocols are based on (some variant of) flooding. Despite various optimizations, many routing messages are propagated unnecessarily. We propose a gossipin...
Zygmunt J. Haas, Joseph Y. Halpern, Erran L. Li
160
Voted
CORR
2010
Springer
189views Education» more  CORR 2010»
15 years 5 months ago
ACRR: Ad Hoc On-Demand Distance Vector Routing with Controlled Route Requests
Reactive routing protocols like Ad-hoc On-Demand Distance Vector Routing (AODV) and Dynamic Source Routing in Ad-Hoc Wireless Networks (DSR) which are used in Mobile and Ad-hoc Ne...
Jayesh Kataria, P. S. Dhekne, Sugata Sanyal
WORDS
2005
IEEE
15 years 10 months ago
Delay Analysis for Statistical Real-Time Channels in Mobile Ad-Hoc Networks
Wireless devices that communicate using the IEEE 802.11 protocol can be used to create mobile ad-hoc networks (MANETs). Many interesting applications using MANETs are realizable i...
Min-Gu Lee, Sunggu Lee
EWSN
2004
Springer
16 years 4 months ago
A Novel Mechanism for Routing in Highly Mobile ad hoc Sensor Networks
This paper describes a novel routing mechanism for a network of highly mobile sensor nodes that routes data over dynamically changing topologies, using only information from neares...
Jane Tateson, Ian W. Marshall