Sciweavers

2691 search results - page 466 / 539
» Security in Ad Hoc Networks
Sort
View
98
Voted
AICCSA
2006
IEEE
126views Hardware» more  AICCSA 2006»
15 years 8 months ago
Restricted Shortest Path Routing with Concave Costs
Multi-constraint quality-of-service routing has become increasingly important as the Internet evolves to support real-time services. Restricted shortest path (RSP) is one of the i...
Pejman Khadivi, Shadrokh Samavi, Hossein Saidi
ICOIN
2004
Springer
15 years 7 months ago
Performance of New Broadcast Forwarding Criteria in MANET
In a mobile ad hoc network (MANET), packet broadcast is common and frequently used to disseminate information. Broadcast consume large amount of bandwidth resource, which is scarce...
Lijuan Zhu, Bu-Sung Lee, Boon-Chong Seet, Kai Juan...
CCCG
2010
15 years 3 months ago
3d local algorithm for dominating sets of unit disk graphs
A dominating set of a graph G = (V, E) is a subset V V of the nodes such that for all nodes v V , either v V or a neighbor u of v is in V . Several routing protocols in ad hoc ...
Alaa Eddien Abdallah, Thomas Fevens, Jaroslav Opat...
SIMUTOOLS
2008
15 years 3 months ago
Efficient and realistic mobility and channel modeling for VANET scenarios using OMNeT++ and INET-framework
Mobility and channel modeling is a very crucial task for the simulation of Vehicular Ad Hoc Network (VANET) scenarios. In this paper we present a new mobility modeling approach fo...
Robert Nagel, Stephan Eichler
ICDCSW
2008
IEEE
15 years 8 months ago
Pairing Devices with Good Quality Output Interfaces
The operation of achieving authenticated key agreement between two human-operated devices over a short range wireless communication channel, such as Bluetooth or WiFi, is known as...
Nitesh Saxena, Jonathan Voris