Sciweavers

1592 search results - page 155 / 319
» Source-Tree Routing in Wireless Networks
Sort
View
ATVA
2005
Springer
156views Hardware» more  ATVA 2005»
15 years 8 months ago
An EFSM-Based Intrusion Detection System for Ad Hoc Networks
Mobile ad hoc networks offer very interesting perspectives in wireless communications due to their easy deployment and their growing performances. However, due to their inherent c...
Jean-Marie Orset, Baptiste Alcalde, Ana R. Cavalli
ADHOC
2008
93views more  ADHOC 2008»
15 years 1 months ago
A MAC layer protocol for wireless networks with asymmetric links
We introduce AsyMAC, a MAC layer protocol for wireless networks with asymmetric links and study a protocol stack consisting of AsyMAC and the A4 LP routing protocol. The two proto...
Guoqiang Wang, Damla Turgut, Ladislau Böl&oum...
117
Voted
WDAG
2009
Springer
114views Algorithms» more  WDAG 2009»
15 years 10 months ago
Virtual Ring Routing Trends
Virtual Ring Routing (VRR) schemes were introduced in the context of wireless ad hoc networks and Internet anycast overlays. They build a network-routing layer using ideas from dis...
Dahlia Malkhi, Siddhartha Sen, Kunal Talwar, Renat...
129
Voted
GLOBECOM
2009
IEEE
15 years 10 months ago
Impact of Social Networks on Delay Tolerant Routing
Abstract—Delay Tolerant Networks (DTNs) are wireless networks in which at any given time instance, the probability of having a complete path from a source to destination is low d...
Eyuphan Bulut, Zijian Wang, Boleslaw K. Szymanski
124
Voted
ACSC
2005
IEEE
15 years 9 months ago
A File Discovery Control Scheme for P2P File Sharing Applications in Wireless Mobile Environments
The mobility characteristic brings new challenges for research of P2P computing over the wireless mobile networking environment. Peers’ movements in wireless mobile network chan...
Chung-Ming Huang, Tz-Heng Hsu, Ming-Fa Hsu