Sciweavers

1835 search results - page 203 / 367
» Security-aware ad hoc routing for wireless networks
Sort
View
97
Voted
IWQOS
2004
Springer
15 years 3 months ago
Distributed on-line schedule adaptation for balanced slot allocation in wireless ad hoc networks
— We propose an algorithm for design and on the fly modification of the schedule of a wireless ad hoc network for provision of fair service guarantees under topological changes...
Theodoros Salonidis, Leandros Tassiulas
ICC
2009
IEEE
153views Communications» more  ICC 2009»
15 years 4 months ago
Detecting Malicious Packet Dropping in the Presence of Collisions and Channel Errors in Wireless Ad Hoc Networks
—Detecting malicious packet dropping is important in ad hoc networks to combat a variety of security attacks such as blackhole, greyhole, and wormhole attacks. We consider the de...
Thaier Hayajneh, Prashant Krishnamurthy, David Tip...
MOBIQUITOUS
2007
IEEE
15 years 4 months ago
The Analysis of Publish/Subscribe Systems over Mobile Wireless Ad Hoc Networks
In this work, we analyze the publish/subscribe distributed system paradigm over mobile ad hoc networks with respect to the performance and the impact of different mobility speeds ...
Thadpong Pongthawornkamol, Klara Nahrstedt, Guijun...
90
Voted
ICCNMC
2005
Springer
15 years 3 months ago
A Prediction-Based Location Update Algorithm in Wireless Mobile Ad-Hoc Networks
Location information in Mobile Ad Hoc Networks (MANETs) provides efficiency to uni-cast and multi-cast algorithms. This paper proposes a new location update algorithm called PLU. T...
Jun Shen, Kun Yang, Shaochun Zhong
78
Voted
INFOCOM
2010
IEEE
14 years 8 months ago
Throughput, Delay, and Mobility in Wireless Ad Hoc Networks
—Throughput capacity in wireless ad hoc networks has been studied extensively under many different mobility models such as i.i.d. mobility model, Brownian mobility model, random ...
Pan Li, Yuguang Fang, Jie Li