Sciweavers

1835 search results - page 8 / 367
» Security-aware ad hoc routing for wireless networks
Sort
View
PEWASUN
2004
ACM
15 years 3 months ago
A novel solution for achieving anonymity in wireless ad hoc networks
A mobile ad hoc network consists of mobile nodes that can move freely in an open environment. Communicating nodes in a wireless and mobile ad hoc network usually seek the help of ...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
SENSYS
2003
ACM
15 years 2 months ago
Model-based compression in wireless ad hoc networks
We present a technique for compression of shortest paths routing tables for wireless ad hoc networks. The main characteristic of such networks is that geographic location of nodes...
Milenko Drinic, Darko Kirovski, Miodrag Potkonjak
FGCN
2007
IEEE
127views Communications» more  FGCN 2007»
15 years 4 months ago
A Survey of Routing Protocols for Energy Constrained Ad Hoc Wireless Networks
In this survey we review energy-aware routing protocols for wireless multihop ad hoc networks and critically discuss the main results in this area. The classification presented is...
Natalia Vassileva, Francisco Barceló-Arroyo
99
Voted
ICN
2007
Springer
15 years 3 months ago
Design Issues of Peer-to-Peer Systems for Wireless Ad Hoc Networks
– Peer-to-peer is a popular distributed system. Mobile ad hoc networks and peer-to-peer file sharing systems both lack fixed infrastructure support and hold no a-priori knowledge...
Dewan Tanvir Ahmed, Shervin Shirmohammadi