Sciweavers

1835 search results - page 119 / 367
» Security-aware ad hoc routing for wireless networks
Sort
View
WD
2010
14 years 9 months ago
Sender- and receiver-centered interference in wireless ad hoc networks
Energy consumption in general and interference in particular are among the most critical issues in wireless networks. In this paper we present the E-BUM calculus, a Energy-aware ca...
Lucia Gallina, Sabina Rossi
IWCMC
2006
ACM
15 years 5 months ago
What does using TCP as an evaluation tool reveal about MANET routing protocols?
Past research studying the operations of TCP over wireless/mobile ad hoc networks has shown that TCP cannot be adopted as-is for use in mobile ad hoc networks (MANET) to achieve r...
Sundaram Rajagopalan, Chien-Chung Shen
100
Voted
MOBIHOC
2002
ACM
15 years 10 months ago
Priority scheduling in wireless ad hoc networks
Ad hoc networks formed without the aid of any established infrastructure are typically multi-hop networks. Location dependent contention and "hidden terminal" problem ma...
Xue Yang, Nitin H. Vaidya
70
Voted
IJWIN
2007
68views more  IJWIN 2007»
14 years 11 months ago
Density-Independent, Scalable Search in Ad Hoc Networks
— We analyze the asymptotic cost of discovering a route within a flat ad hoc network and we show that one can discover a route with cost that is proportional only to the area of...
Zygmunt J. Haas, Rimon Barr
PERCOM
2010
ACM
14 years 9 months ago
Privacy-enhanced social network routing in opportunistic networks
Opportunistic networking - forwarding messages in a disconnected mobile ad hoc network via any encountered nodes - otters a new mechanism for exploiting the mobile devices that man...
Iain Parris, Greg Bigwood, Tristan Henderson