Sciweavers

1835 search results - page 290 / 367
» Security-aware ad hoc routing for wireless networks
Sort
View
ISCC
2006
IEEE
190views Communications» more  ISCC 2006»
15 years 3 months ago
Time-Critical Underwater Sensor Diffusion with No Proactive Exchanges and Negligible Reactive Floods
— In this paper we study multi-hop ad hoc routing in a scalable Underwater Sensor Network (UWSN), which is a novel network paradigm for ad hoc investigation of the world below th...
Uichin Lee, Jiejun Kong, Joon-Sang Park, Eugenio M...
MUE
2007
IEEE
81views Multimedia» more  MUE 2007»
15 years 4 months ago
Energy Consumption of Swarm Intelligence inspired Routing Algorithms in MANETs
Swarm Intelligence (SI) inspired routing algorithms have become a research focus in recent years due to their self-organizing nature, which is very suitable to the routing problem...
Jin Wang, Brian J. d'Auriol, Xiaoling Wu, Young-Ko...
SCN
2011
Springer
348views Communications» more  SCN 2011»
14 years 4 months ago
MANET QoS support without reservations
An inelastic flow is a flow with inelastic rate: i.e., the rate is fixed, it cannot be dynamically adjusted to traffic and load condition as in elastic flows like TCP. Real ti...
Soon-Young Oh, Gustavo Marfia, Mario Gerla
CLUSTER
2011
IEEE
13 years 9 months ago
A mobility-based cluster formation algorithm for wireless mobile ad-hoc networks
  In the last decade, numerous efforts have been devoted to design efficient algorithms for clustering the  wireless mobile ad‐hoc networks (MANET) consider...
Javad Akbari Torkestani, Mohammad Reza Meybodi
BROADNETS
2007
IEEE
15 years 4 months ago
Assessing discreet packet-dropping attacks using nearest-neighbor and path-vector attribution
— A Mobile Ad-Hoc Network (MANET) is considered with nodes that may act selfishly or maliciously by simply dropping data packets rather than forwarding them. We study a distribu...
Arnab Das 0002, George Kesidis, Venkat Pothamsetty