Sciweavers

1835 search results - page 109 / 367
» Security-aware ad hoc routing for wireless networks
Sort
View
TRIDENTCOM
2005
IEEE
15 years 4 months ago
Wireless Nomadic Transfer over Mobile Ad hoc Networks
Mobile ad hoc networking allows the development of several infrastructure free applications. One of the arguments we focused on is the possibility of deploying a set of services i...
Stefano Annese, Andrea Ghittino
IMSCCS
2007
IEEE
15 years 5 months ago
A Mobile Ad Hoc Network with Mobile Satellite Earth-stations
Ad hoc networks face the problem of improving networks’ capacity and scalability. The scalability problem can be properly solved through physical hierarchy networking. In this p...
Song Han, Guochang Gu, Jun Ni
GECCO
2007
Springer
268views Optimization» more  GECCO 2007»
15 years 5 months ago
Vulnerability analysis and security framework (BeeSec) for nature inspired MANET routing protocols
Design, development and evaluation of adaptive, scalable, and power aware Bio/Nature inspired routing protocols has received a significant amount of attention in the recent past....
Nauman Mazhar, Muddassar Farooq
ADHOCNETS
2009
Springer
15 years 5 months ago
Enhancement of Self-organisation in Wireless Networking through a Cross-Layer Approach
Self-organisation has emerged as a very promising approach to the design, deployment, operation, control and evolution of complex wireless networks. The dominant strictly layered d...
Mohammad Abdur Razzaque, Simon A. Dobson, Paddy Ni...
INFOCOM
2006
IEEE
15 years 5 months ago
A Brownian Motion Model for Last Encounter Routing
— We use a mathematical model based on Brownian motion to analyze the performance of Last Encounter Routing (LER), a routing protocol for ad hoc networks. Our results show that, ...
Stratis Ioannidis, Peter Marbach