Sciweavers

2691 search results - page 67 / 539
» Securing Ad Hoc Networks
Sort
View
ISCC
2003
IEEE
122views Communications» more  ISCC 2003»
15 years 9 months ago
TCP-aware Source Routing in Mobile Ad Hoc Networks
— Temporary link failures and route changes occur frequently in mobile ad hoc networks. Since TCP assumes that all packet losses are due to network congestion, TCP does not show ...
Jin-Hee Choi, Chuck Yoo
ISCIS
2003
Springer
15 years 9 months ago
Design and Evaluation of a Source Routed Ad Hoc Network
Effects of network parameters on the performance of mobile ad hoc networks (MANETs) have been widely investigated. However, there are certain issues related to the hardware implem...
Faysal Basci, Hakan Terzioglu, Taskin Koçak
WICON
2008
15 years 5 months ago
Programming in mobile ad hoc networks
The possibility for spontaneous ad hoc networks between mobile devices has been increasing as small devices become more capable of hosting useful networked applications. These app...
Justin Collins, Rajive Bagrodia
AAAI
2004
15 years 5 months ago
Intelligent Systems Demonstration: The Secure Wireless Agent Testbed (SWAT)
We will demonstrate the Secure Wireless Agent Testbed (SWAT), a unique facility developed at Drexel University to study integration, networking and information assurance for next-...
Gustave Anderson, Andrew Burnheimer, Vincent A. Ci...
WCNC
2008
IEEE
15 years 10 months ago
Adaptive Routing in Dynamic Ad Hoc Networks
Abstract—Dynamic ad hoc networks are mobile ad hoc networks (MANETs) where network characteristics, such as network density and node mobility, change significantly over time and...
Cong Liu, Jie Wu