Results 1 - 10
of
243
Routing and Broadcasting in Ad-Hoc Networks
"... I would like to thank Prof. Dr. Torsten Braun, head of the Computer Network and Distributed Systems group (RVS), for supervising this work and for his insightful advises. Prof. Dr. Torsten Braun encouraged and motivated me to publish my research results and he provided me the opportunity to present ..."
Abstract
- Add to MetaCart
I would like to thank Prof. Dr. Torsten Braun, head of the Computer Network and Distributed Systems group (RVS), for supervising this work and for his insightful advises. Prof. Dr. Torsten Braun encouraged and motivated me to publish my research results and he provided me the opportunity to present
On coding for reliable communication over packet networks
, 2008
"... We consider the use of random linear network coding in lossy packet networks. In particular, we consider the following simple strategy: nodes store the packets that they receive and, whenever they have a transmission opportunity, they send out coded packets formed from random linear combinations of ..."
Abstract
-
Cited by 217 (37 self)
- Add to MetaCart
an amount of side-information that grows arbitrarily large (but independently of payload size), random linear network coding achieves packet-level capacity for both single unicast and single multicast connections and for both wireline and wireless networks. This result holds as long as packets received
Self-securing ad hoc wireless networks
- In IEEE ISCC (IEEE Symposium on Computers and Communications
, 2002
"... Mobile ad hoc networking offers convenient infrastructure-free communication over the shared wireless channel. However, the nature of ad hoc networks makes them vulnerable to security attacks. Examples of such attacks include passive eavesdropping over the wireless channel, denial of service attacks ..."
Abstract
-
Cited by 107 (1 self)
- Add to MetaCart
Mobile ad hoc networking offers convenient infrastructure-free communication over the shared wireless channel. However, the nature of ad hoc networks makes them vulnerable to security attacks. Examples of such attacks include passive eavesdropping over the wireless channel, denial of service
Self-Stabilizing TDMA Algorithms for Dynamic Wireless Ad-hoc Networks ∗
"... In dynamic wireless ad-hoc networks (DynWANs), autonomous computing devices set up a network for the communication needs of the moment. These networks require the implementation of a medium access control (MAC) layer. We consider MAC protocols for DynWANs that need to be autonomous and robust as wel ..."
Abstract
- Add to MetaCart
In dynamic wireless ad-hoc networks (DynWANs), autonomous computing devices set up a network for the communication needs of the moment. These networks require the implementation of a medium access control (MAC) layer. We consider MAC protocols for DynWANs that need to be autonomous and robust
A Microscopic Analysis of TCP Performance over Wireless Ad-hoc Networks
- In Proc. ACM SIGMETRICS (poster paper
, 2002
"... this paper is to study the performance of the TCP transport layer protocol over ad-hoc networks. Recent works in transport protocols for ad-hoc networks have investigated the impact of ad-hoc network characteristics on TCP's performance, and proposed schemes that help TCP overcome the negative ..."
Abstract
- Add to MetaCart
this paper is to study the performance of the TCP transport layer protocol over ad-hoc networks. Recent works in transport protocols for ad-hoc networks have investigated the impact of ad-hoc network characteristics on TCP's performance, and proposed schemes that help TCP overcome the negative
Coloring-based Resource Allocations in Ad-hoc Wireless Networks
"... Abstract-It is well known that CSMA/CA protocols exhibit very poor performance in case of multi-hop transmissions, because of inter-link interference due to imperfect carrier sensing. We propose to control such an interference by preallocating temporal slots in which different sets of network nodes ..."
Abstract
- Add to MetaCart
power, modulation/coding schemes, and so on), most ad-hoc networks rely on contention-based medium access protocols, since the use of carrier sense and random backoff mechanisms is a simple and well-established solution for distributedly managing multiple-access over a shared channel bandwidth. However
A Framework for Joint Multiple Description Coding and Network Coding over Wireless Ad-hoc Networks
"... Abstract—Network coding (NC) can achieve the maximum information flow in the network by allowing nodes to combine re-ceived packets before retransmission. Several works have shown NC to be beneficial in mobile ad-hoc networks, but the delay introduced by buffered decoding raises a problem in real-ti ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
Abstract—Network coding (NC) can achieve the maximum information flow in the network by allowing nodes to combine re-ceived packets before retransmission. Several works have shown NC to be beneficial in mobile ad-hoc networks, but the delay introduced by buffered decoding raises a problem in real
Stochastic Analysis of Non-slotted Aloha in Wireless Ad-Hoc Networks
, 2010
"... Abstract: In this paper we propose two analytically tractable stochastic models of non-slotted Aloha for Mobile Ad-hoc NETworks (MANETs): one model assumes a static pattern of nodes while the other assumes that the pattern of nodes varies over time. Both models feature transmitters randomly located ..."
Abstract
-
Cited by 10 (5 self)
- Add to MetaCart
Abstract: In this paper we propose two analytically tractable stochastic models of non-slotted Aloha for Mobile Ad-hoc NETworks (MANETs): one model assumes a static pattern of nodes while the other assumes that the pattern of nodes varies over time. Both models feature transmitters randomly located
Throughput capacity of random ad hoc networks with infrastructure support
- in MOBICOM
, 2003
"... In this paper, we consider the transport capacity of ad hoc networks with a random flat topology under the present support of an infinite capacity infrastructure network. Such a network architecture allows ad hoc nodes to communicate with each other by purely using the remaining ad hoc nodes as thei ..."
Abstract
-
Cited by 100 (0 self)
- Add to MetaCart
points, constitute a connected topology graph. This is a significant improvement over the capacity of random ad hoc networks with no infrastructure support which is found as Θ(W / p N log(N)) in [1]. Although better capacity figures may be obtained by complex network coding or exploiting mobility
Feature selection in intrusion detection system over mobile ad-hoc network
, 2005
"... As Mobile ad-hoc network (MANET) has become a very important technology the security problem, especially, intrusion detection technique research has attracted many people’s effort. MANET is more vulnerable than wired network and suffers intrusion like wired network. This paper investigated some intr ..."
Abstract
-
Cited by 3 (0 self)
- Add to MetaCart
As Mobile ad-hoc network (MANET) has become a very important technology the security problem, especially, intrusion detection technique research has attracted many people’s effort. MANET is more vulnerable than wired network and suffers intrusion like wired network. This paper investigated some
Results 1 - 10
of
243