Sciweavers

2691 search results - page 82 / 539
» Security in Ad Hoc Networks
Sort
View
PERCOM
2009
ACM
15 years 8 months ago
BitHoc: A content sharing application for Wireless Ad hoc Networks
—As a result of the wide spread of new efficient mobile communication devices, users are more and more willing to find on these devices (PDAs, Smartphones, etc) applications si...
Amir Krifa, Mohamed Karim Sbai, Chadi Barakat, Thi...
ICC
2007
IEEE
205views Communications» more  ICC 2007»
15 years 8 months ago
RLAR: Robust Link Availability Routing Protocol for Mobile Ad Hoc Networks
— Many previously proposed routing metrics and algorithms for ad hoc networks work well in static networks, however, when nodes are moving and wireless links may fail from time t...
Xueyuan Su, Sammy Chan, King Sun Chan
IJWIN
2007
68views more  IJWIN 2007»
15 years 1 months ago
Density-Independent, Scalable Search in Ad Hoc Networks
— We analyze the asymptotic cost of discovering a route within a flat ad hoc network and we show that one can discover a route with cost that is proportional only to the area of...
Zygmunt J. Haas, Rimon Barr
MOBIHOC
2000
ACM
15 years 6 months ago
DDR: distributed dynamic routing algorithm for mobile ad hoc networks
— This paper presents an alternative simple loop-free bandwidth-efficient distributed routing algorithm for mobile ad hoc networks, denoted as distributed dynamic routing (DDR)....
Navid Nikaein, Houda Labiod, Christian Bonnet
ASE
2005
96views more  ASE 2005»
15 years 1 months ago
A Termination Detection Protocol for Use in Mobile Ad Hoc Networks
As devices become smaller and wireless networking technologies improve, the popularity of mobile computing continues to rise. In today's world, many consider devices such as c...
Gruia-Catalin Roman, Jamie Payton