Sciweavers

1104 search results - page 157 / 221
» Simple Robotic Routing in Ad Hoc Networks
Sort
View
INFOCOM
2010
IEEE
14 years 10 months ago
Impact of Correlated Mobility on Delay-Throughput Performance in Mobile Ad-Hoc Networks
—We extend the analysis of the scaling laws of wireless ad hoc networks to the case of correlated nodes movements, which are commonly found in real mobility processes. We conside...
Delia Ciullo, Valentina Martina, Michele Garetto, ...
WOWMOM
2006
ACM
135views Multimedia» more  WOWMOM 2006»
15 years 5 months ago
A MAC Layer Protocol for Priority-based Reliable Multicast in Wireless Ad Hoc Networks
RTS-CTS handshake based protocols achieve “reliable unicast” by eliminating the hidden node problem effectively, however, these solutions are not directly or efficiently gene...
Murat Demirbas, Muzammil Hussain
ICC
2009
IEEE
153views Communications» more  ICC 2009»
15 years 6 months ago
Detecting Malicious Packet Dropping in the Presence of Collisions and Channel Errors in Wireless Ad Hoc Networks
—Detecting malicious packet dropping is important in ad hoc networks to combat a variety of security attacks such as blackhole, greyhole, and wormhole attacks. We consider the de...
Thaier Hayajneh, Prashant Krishnamurthy, David Tip...
GLOBECOM
2007
IEEE
15 years 6 months ago
Precise Localization with Smart Antennas in Ad-Hoc Networks
—In this paper, we study precise localization using Angle of Arrival (AOA) estimations by smart-antenna equipped beacons in Ad-Hoc networks. The node to be localized sends a sign...
Zhilong Shan, Tak-Shing Peter Yum
CIIT
2007
195views Communications» more  CIIT 2007»
15 years 1 months ago
Using a cache scheme to detect selfish nodes in mobile ad hoc networks
This paper presents a hardware based cache scheme to detect selfish nodes in mobile ad hoc network. In this scheme, the hardware monitors the activities of the upperlayer software...
H. Lin, José G. Delgado-Frias, Sirisha Medi...