Sciweavers

1835 search results - page 267 / 367
» Security-aware ad hoc routing for wireless networks
Sort
View
JNW
2008
117views more  JNW 2008»
14 years 10 months ago
An Intelligent Multicast Ad-hoc On demand Distance Vector Protocol for MANETs
-Recently multicast routing protocols in Mobile Ad-hoc Networks (MANETs) are emerging for wireless group communication. This includes application such as multipoint data disseminat...
E. Baburaj, V. Vasudevan
COMCOM
2008
131views more  COMCOM 2008»
14 years 10 months ago
CORA: Collaborative Opportunistic Recovery Algorithm for loss controlled, delay bounded ad hoc multicast
In this paper, we present Collaborative Opportunistic Recovery Algorithm (CORA) designed for multicast multimedia applications with low loss as well as latency constraints in ad h...
Yunjung Yi, Jiejun Kong, Mario Gerla, Joon-Sang Pa...
MOBIHOC
2003
ACM
15 years 9 months ago
Mobility helps security in ad hoc networks
Contrary to the common belief that mobility makes security more difficult to achieve, we show that node mobility can, in fact, be useful to provide security in ad hoc networks. We...
Jean-Pierre Hubaux, Levente Buttyán, Srdjan...
MIDDLEWARE
2004
Springer
15 years 3 months ago
Adapting asynchronous messaging middleware to ad hoc networking
The characteristics of mobile environments, with the possibility of frequent disconnections and fluctuating bandwidth, have forced a rethink of traditional middleware. In particu...
Mirco Musolesi, Cecilia Mascolo, Stephen Hailes
IJAHUC
2008
80views more  IJAHUC 2008»
14 years 10 months ago
Performance evaluation of node density-based adaptive routing scheme for disruption tolerant networks
: Traditional ad hoc routing protocols do not work in intermittently connected networks since end-to-end paths may not exist in such networks. Hence, routing mechanisms that can wi...
Mooi Choo Chuah, Peng Yang