An ad hoc or sensor network that is employed for security sensitive applications is expected to tolerate a certain quantity of maliciously behaving nodes. Algorithms must be desig...
In this paper, we evaluate the performance of a Medium Access Control (MAC) protocol for MIMO ad hoc networks under imperfect channel estimation. To this end, we also present an an...
Using ad hoc networks as alternative means of communication in disaster situations is a salutary solution. However, analysing application performance is mandatory for evaluating su...
— Recent advances in wireless technology as well as in electronics industry have given rise to the widespread of wireless ad-hoc networking. Expanding data-centric applications t...
Wireless network research still lacks methods to integratively evaluate the performance that can be expected from application layer protocols. The user behavior is predominantly aï...
Tobias Breyer, Michael Klein, Philipp Obreiter, Bi...