Sciweavers

766 search results - page 126 / 154
» Securing Ad hoc Routing Protocols
Sort
View
110
Voted
AINA
2008
IEEE
15 years 5 months ago
Towards a Usenet-Like Discussion System for Users of Disconnected MANETs
Applications that rely on the publish-subscribe model (such as those dedicated to news or event distribution) require a communication model whereby information can flow towards a...
Julien Haillot, Frédéric Guidec
115
Voted
SIGMETRICS
2006
ACM
104views Hardware» more  SIGMETRICS 2006»
15 years 5 months ago
Modeling adoptability of secure BGP protocols
Despite the existence of several secure BGP routing protocols, there has been little progress to date on actual adoption. Although feasibility for widespread adoption remains the ...
Haowen Chan, Debabrata Dash, Adrian Perrig, Hui Zh...
MOBIHOC
2003
ACM
15 years 10 months ago
Topology management in ad hoc networks
The efficiency of a communication network depends not only on its control protocols, but also on its topology. We propose a distributed topology management algorithm that construc...
Lichun Bao, J. J. Garcia-Luna-Aceves
PERCOM
2009
ACM
15 years 11 months ago
P2P over MANET: Indirect Tree-based Routing
Abstract--Mobile Ad hoc NETworks (MANET) and Peer-ToPeer (P2P) systems are emerging technologies sharing a common underlying decentralized networking paradigm. However, the related...
Marcello Caleffi, Luigi Paura
MATA
2000
Springer
137views Communications» more  MATA 2000»
15 years 2 months ago
Topology Discovery in Ad Hoc Wireless Networks Using Mobile Agents
Extensive research on mobile agents has been rife with the growing interests in network computing. In this paper, we have discussed a mobile multi-agent-based framework to address ...
Romit Roy Choudhury, Somprakash Bandyopadhyay, Kri...