Sciweavers

1835 search results - page 242 / 367
» Security-aware ad hoc routing for wireless networks
Sort
View
BROADNETS
2006
IEEE
15 years 4 months ago
How to Specify and How to Prove Correctness of Secure Routing Protocols for MANET
Secure routing protocols for mobile ad hoc networks have been developed recently, yet, it has been unclear what are the properties they achieve, as a formal analysis of these prot...
Panagiotis Papadimitratos, Zygmunt J. Haas, Jean-P...
ASMTA
2008
Springer
100views Mathematics» more  ASMTA 2008»
14 years 12 months ago
A Tandem Queueing Model for Delay Analysis in Disconnected Ad Hoc Networks
Ad hoc network routing protocols may fail to operate in the absence of an end-to-end connection from source to destination. This deficiency can be resolved by so-called delay-toler...
Ahmad Al Hanbali, Roland de Haan, Richard J. Bouch...
JCO
2006
101views more  JCO 2006»
14 years 10 months ago
Energy conservation through resource-aware movement in heterogeneous mobile ad hoc networks
Abstract Energy conservation in mobile ad hoc networks is of paramount importance because most mobile nodes usually have very limited energy supply. Previous research on this issue...
Wei Liu, Yanchao Zhang, Yuguang Fang, Kejie Lu
ADHOC
2004
100views more  ADHOC 2004»
14 years 10 months ago
Position and orientation in ad hoc networks
Position and orientation information of individual nodes in ad hoc networks is useful for both service and application implementation. Services that can be enabled by availability...
Dragos Niculescu, Badri Nath
IJSNET
2008
118views more  IJSNET 2008»
14 years 10 months ago
A fuzzy-based virtual backbone routing for large-scale MANETs
: Virtual backbone-based routing is a promising approach for enhancing the routing efficiency in MANETs. To establish communication in the network, the virtual backbone nodes have ...
Wassim El-Hajj, Dionysios Kountanis, Ala I. Al-Fuq...