— Many MAC sub-layer protocols for supporting the usage of directional antennas in ad hoc networks have been proposed in literature. However, there remain two open issues that ar...
Gentian Jakllari, Wenjie Luo, Srikanth V. Krishnam...
When asymmetric cryptography techniques are used in wireless networks, the public keys of the nodes need to be widely available and signed by a Certificate Authority (CA). However,...
This paper presents a novel swarm intelligence inspired routing algorithm (EARA) for mobile ad hoc networks. Based on the understanding of the evolutionary cooperation in the biol...
Zhenyu Liu, Marta Z. Kwiatkowska, Costas C. Consta...
Recent advances in wireless communication along with Peer-to-peer (P2P) paradigm have led to increasing interest in P2P mobile ad hoc networks. In this paper, we assume an environ...
Wireless network research still lacks methods to integratively evaluate the performance that can be expected from application layer protocols. The user behavior is predominantly aï...
Tobias Breyer, Michael Klein, Philipp Obreiter, Bi...