Sciweavers

1592 search results - page 141 / 319
» Source-Tree Routing in Wireless Networks
Sort
View
228
Voted
CORR
2011
Springer
536views Education» more  CORR 2011»
14 years 7 months ago
Performance Analysis of AODV under Black Hole Attack through Use of OPNET Simulator
— Mobile ad hoc networks (MANETs) are dynamic wireless networks without any infrastructure. These networks are weak against many types of attacks. One of these attacks is the bla...
H. A. Esmaili, M. R. Khalili Shoja, Hossein Gharae...
114
Voted
PERCOM
2007
ACM
16 years 12 days ago
Multi-level Hashing for Peer-to-Peer System in Wireless Ad Hoc Environment
? Peer-to-peer is a popular distributed system. With the advancement in mobile technologies, mobile p2p has revealed its attraction. But, the resource constraints such as bandwidth...
Dewan Tanvir Ahmed, Shervin Shirmohammadi
PADS
2004
ACM
15 years 6 months ago
Simulation Validation Using Direct Execution of Wireless Ad-Hoc Routing Protocols
Computer simulation is the most common approach to studying wireless ad-hoc routing algorithms. The results, however, are only as good as the models the simulation uses. One shoul...
Jason Liu, Yougu Yuan, David M. Nicol, Robert S. G...
87
Voted
AICCSA
2006
IEEE
126views Hardware» more  AICCSA 2006»
15 years 6 months ago
Restricted Shortest Path Routing with Concave Costs
Multi-constraint quality-of-service routing has become increasingly important as the Internet evolves to support real-time services. Restricted shortest path (RSP) is one of the i...
Pejman Khadivi, Shadrokh Samavi, Hossein Saidi
100
Voted
ICDCSW
2007
IEEE
15 years 7 months ago
Reception-Aware Routing for Energy Conservation in Ad Hoc Networks
Energy is a scarce resource in ad hoc mobile networks, making energy-aware communication crucial. In the absence of a central controlling entity and due to its dynamic network top...
Nirisha Shrestha