Sciweavers

1592 search results - page 155 / 319
» Source-Tree Routing in Wireless Networks
Sort
View
119
Voted
ATVA
2005
Springer
156views Hardware» more  ATVA 2005»
15 years 6 months ago
An EFSM-Based Intrusion Detection System for Ad Hoc Networks
Mobile ad hoc networks offer very interesting perspectives in wireless communications due to their easy deployment and their growing performances. However, due to their inherent c...
Jean-Marie Orset, Baptiste Alcalde, Ana R. Cavalli
126
Voted
ADHOC
2008
93views more  ADHOC 2008»
14 years 11 months ago
A MAC layer protocol for wireless networks with asymmetric links
We introduce AsyMAC, a MAC layer protocol for wireless networks with asymmetric links and study a protocol stack consisting of AsyMAC and the A4 LP routing protocol. The two proto...
Guoqiang Wang, Damla Turgut, Ladislau Böl&oum...
WDAG
2009
Springer
114views Algorithms» more  WDAG 2009»
15 years 7 months ago
Virtual Ring Routing Trends
Virtual Ring Routing (VRR) schemes were introduced in the context of wireless ad hoc networks and Internet anycast overlays. They build a network-routing layer using ideas from dis...
Dahlia Malkhi, Siddhartha Sen, Kunal Talwar, Renat...
109
Voted
GLOBECOM
2009
IEEE
15 years 7 months ago
Impact of Social Networks on Delay Tolerant Routing
Abstract—Delay Tolerant Networks (DTNs) are wireless networks in which at any given time instance, the probability of having a complete path from a source to destination is low d...
Eyuphan Bulut, Zijian Wang, Boleslaw K. Szymanski
102
Voted
ACSC
2005
IEEE
15 years 6 months ago
A File Discovery Control Scheme for P2P File Sharing Applications in Wireless Mobile Environments
The mobility characteristic brings new challenges for research of P2P computing over the wireless mobile networking environment. Peers’ movements in wireless mobile network chan...
Chung-Ming Huang, Tz-Heng Hsu, Ming-Fa Hsu