Sciweavers

2691 search results - page 79 / 539
» Security in Ad Hoc Networks
Sort
View
FUIN
2010
163views more  FUIN 2010»
14 years 11 months ago
Equational Reasoning on Mobile Ad Hoc Networks
We provide an equational theory for Restricted Broadcast Process Theory to reason about ad hoc networks. We exploit an extended algebra called Computed Network Theory to axiomatize...
Fatemeh Ghassemi, Wan Fokkink, Ali Movaghar
ADHOCNOW
2008
Springer
15 years 8 months ago
Mitigating Reply Implosions in Query-Based Service Discovery Protocols for Mobile Wireless Ad Hoc Networks
Providing service discovery in an efficient and scalable way in ad hoc networks is a challenging problem, in particular for multihop scenarios, due to the large number of potential...
Antônio Tadeu A. Gomes, Artur Ziviani, Lucia...
AINA
2003
IEEE
15 years 7 months ago
Performance Evaluation of Modified IEEE 802.11 MAC for Multi-Channel Multi-Hop Ad Hoc Network
In this paper, the IEEE 802.11 multiple access control protocol was modified for use in multi-channel, multi-hop ad hoc network, through the use of a new channel-status indicator....
Jiandong Li, Zygmunt J. Haas, Min Sheng, Yanhui Ch...
105
Voted
DIALM
1999
ACM
113views Algorithms» more  DIALM 1999»
15 years 6 months ago
Flooding for reliable multicast in multi-hop ad hoc networks
Ad hoc networks are gaining popularity as a result of advances in smaller, more versatile and powerful mobile computing devices. The distinguishing feature of these networks is the...
Christopher Ho, Katia Obraczka, Gene Tsudik, Kumar...
MOBICOM
2003
ACM
15 years 7 months ago
Throughput capacity of random ad hoc networks with infrastructure support
In this paper, we consider the transport capacity of ad hoc networks with a random flat topology under the present support of an infinite capacity infrastructure network. Such a...
Ulas C. Kozat, Leandros Tassiulas