• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 13,374
Next 10 →

Ad Hoc Routing Protocol Validation

by Oskar Wibling, Oskar Wibling, Oskar Wibling , 2005
"... We explore and evaluate methods for validation of ad hoc routing protocols which are used to set up forwarding paths in spontaneous networks of mobile devices. The focus is automatic formal verification but we also make an initial account of a protocol performance comparison using structured live te ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
We explore and evaluate methods for validation of ad hoc routing protocols which are used to set up forwarding paths in spontaneous networks of mobile devices. The focus is automatic formal verification but we also make an initial account of a protocol performance comparison using structured live

The Chord Ad-hoc Routing Protocol

by George Porter , Kevin Lai, Ion Stoica, Jeremy Condit , 2002
"... This paper describes the Chord Ad-Hoc Routing Protocol, which is a multi-hop, ad-hoc networking protocol that provides the Chord Distributed Hash Table (DHT) abstraction to the network. Nodes form a spanning tree among themselves, which forms a cycle that becomes the Chord overlay network. By coupli ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
This paper describes the Chord Ad-Hoc Routing Protocol, which is a multi-hop, ad-hoc networking protocol that provides the Chord Distributed Hash Table (DHT) abstraction to the network. Nodes form a spanning tree among themselves, which forms a cycle that becomes the Chord overlay network

Classification of Ad Hoc Routing Protocols

by Petteri Kuosmanen
"... Mobile ad hoc networks (MANET) are networks which routing is based on multi-hop routing from a source to a destination node or nodes. These networks have quite a many constrains because of uncertainty of radio interface and its limitations e.g. in available bandwidth. Also some terminals have limita ..."
Abstract - Cited by 7 (0 self) - Add to MetaCart
to be chosen must cover all states of a specified network and never is allowed to consume too much network resources by protocol overhead traffic. This seminar paper deals with a classification of ad hoc routing protocols and also presents some specified protocols according to that classification. Presented

Performance of Ad Hoc Routing Protocols: Characteristics and

by Comparison Sampo Naski, Sampo Naski , 2004
"... Mobile ad hoc networks are networks without fixed infrastructure. The mobile nodes perform both as a host and a router forwarding packets to other nodes. Because of the nature of ad hoc networks, there are special demands for ad hoc routing protocols. Also the performance is an interesting issue. Th ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Mobile ad hoc networks are networks without fixed infrastructure. The mobile nodes perform both as a host and a router forwarding packets to other nodes. Because of the nature of ad hoc networks, there are special demands for ad hoc routing protocols. Also the performance is an interesting issue

Automatized Verification of Ad Hoc Routing Protocols

by Oskar Wibling , Joachim Parrow , Arnold Pears - in Formal Techniques for Networked and Distributed Systems (FORTE 2004 , 2004
"... Abstract. Numerous specialized ad hoc routing protocols are currently proposed for use, or being implemented. Few of them have been subjected to formal verification. This paper evaluates two model checking tools, SPIN and UPPAAL, using the verification of the Lightweight Underlay Network Ad hoc Rou ..."
Abstract - Cited by 21 (2 self) - Add to MetaCart
Abstract. Numerous specialized ad hoc routing protocols are currently proposed for use, or being implemented. Few of them have been subjected to formal verification. This paper evaluates two model checking tools, SPIN and UPPAAL, using the verification of the Lightweight Underlay Network Ad hoc

On the Scalability of Ad Hoc Routing Protocols

by Cesar A. Santivanez, Bruce Mcdonald, Ioannis Stavrakakis, Ram Ramanathan - in Proc. of IEEE Infocom , 2002
"... A novel framework is presented for the study of scalability in ad hoc networks. Using this framework, the first asymptotic analysis is provided with respect to network size, mobility, and traffic for each fundamental class of ad hoc routing algorithms. Protocols studied include the following: Plain ..."
Abstract - Cited by 60 (1 self) - Add to MetaCart
A novel framework is presented for the study of scalability in ad hoc networks. Using this framework, the first asymptotic analysis is provided with respect to network size, mobility, and traffic for each fundamental class of ad hoc routing algorithms. Protocols studied include the following: Plain

Dynamic Deployment and Reconfiguration of Ad-hoc Routing Protocols

by Rajiv Ramdhany, Paul Grace, Geoff Coulson, David Hutchison - Journal of Internet Services and Applications , 2010
"... Abstract. The innate dynamicity and complexity of mobile ad-hoc networks (MANETs) has resulted in numerous ad-hoc routing protocols being proposed. Furthermore, numerous variants and hybrids continue to be reported in the literature. This diversity appears to be inherent to the field—it seems unlike ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Abstract. The innate dynamicity and complexity of mobile ad-hoc networks (MANETs) has resulted in numerous ad-hoc routing protocols being proposed. Furthermore, numerous variants and hybrids continue to be reported in the literature. This diversity appears to be inherent to the field—it seems

Securing Ad hoc Routing Protocols

by Frank Kargl, Stefan Schlott, Andreas Klenk, Alfred Geiss, Michael Weber - in Proceedings of 30th Euromicro Conference , 2004
"... Ad hoc networks are subject of many recent research efforts. Especially in mobile scenarios, self-organizing networks are of high interest. While the routing aspects of mobile ad hoc networks (MANETs) are already well understood, the research activities about security in MANETs are still at their be ..."
Abstract - Cited by 8 (5 self) - Add to MetaCart
)behaviour of MANET participants. We introduce a systematology of attacks on a MANET. Further, we describe the results of simulations that show, how misbehaving nodes affect MANETs based on the DSR routing protocol. Finally we outline a security architecture that provides substantial security services for Ad hoc

On the Scalability of Ad Hoc Routing Protocols

by Cesar Santivanez Bruce, Bruce Mcdonald, Ioannis Stavrakakis, Ram Ramanathan - in Proc. of IEEE Infocom , 2002
"... A novel framework is presented for the study of scalability in ad hoc networks. Using this framework, the first asymptotic analysis is provided with respect to network size, mobility, and traffic for each fundamental class of ad hoc routing algorithms. Protocols studied include the following: Plain ..."
Abstract - Add to MetaCart
A novel framework is presented for the study of scalability in ad hoc networks. Using this framework, the first asymptotic analysis is provided with respect to network size, mobility, and traffic for each fundamental class of ad hoc routing algorithms. Protocols studied include the following: Plain

Securing Ad hoc Routing Protocols

by Andreas Klenk, Technische Universität München, See Profile, Frank Kargl, Stefan Schlott, Andreas Klenk, Alfred Geiss, Michael Weber
"... All in-text references underlined in blue are linked to publications on ResearchGate, letting you access and read them immediately. ..."
Abstract - Add to MetaCart
All in-text references underlined in blue are linked to publications on ResearchGate, letting you access and read them immediately.
Next 10 →
Results 1 - 10 of 13,374
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University