Sciweavers

1835 search results - page 128 / 367
» Security-aware ad hoc routing for wireless networks
Sort
View
77
Voted
JCM
2007
177views more  JCM 2007»
14 years 11 months ago
Collision Free MAC Protocols for Wireless Ad Hoc Networks based on BIBD Architecture
—Wireless Ad hoc networks represent a powerful telecommunication infrastructure that is being exploited for enabling general wireless networking connectivity for a variety of sig...
Pietro Camarda, Orazio Fiume
80
Voted
ADHOC
2007
107views more  ADHOC 2007»
14 years 11 months ago
On-line disjoint path routing for network capacity maximization in energy-constrained ad hoc networks
In this paper we consider on-line disjoint path routing in energy-constrained ad hoc networks. The objective is to maximize the network capacity, i.e. maximize the number of messa...
Weifa Liang, Yuzhen Liu
SECPERU
2006
IEEE
15 years 5 months ago
Detecting Critical Nodes for MANET Intrusion Detection Systems
Ad hoc routing protocols have been designed to efficiently reroute traffic when confronted with network congestion, faulty nodes, and dynamically changing topologies. The common d...
A. Karygiannis, E. Antonakakis, A. Apostolopoulos
ICOIN
2001
Springer
15 years 3 months ago
An Intelligent On-Demand Multicast Routing Protocol in Ad Hoc Networks
In thispaper; we present an intelligent on-demandmulticast routing protocol (IOD-MRP)which is suited in rapidly changing network environments, such as ad hoc networks. This protoc...
Kuochen Wang, Chaou-Tang Chang
72
Voted
INFOCOM
2008
IEEE
15 years 5 months ago
Embracing Interference in Ad Hoc Networks Using Joint Routing and Scheduling with Multiple Packet Reception
— We present an approach that takes advantage of multi-packet reception (MPR) to reduce the negative effects of multiple access interference and therefore increase the capacity o...
Xin Wang, J. J. Garcia-Luna-Aceves