• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 167
Next 10 →

Probabilistic Broadcast for Flooding in Wireless Mobile Ad hoc Networks

by Yoav Sasson, David Cavin, André Schiper , 2002
"... Although far from optimal, flooding is an indispensable message dissemination technique for network-wide broadcast within mobile ad hoc networks (MANETs). As such, the plain flooding algorithm provokes a high number of unnecessary packet rebroadcasts, causing contention, packet collisions and ult ..."
Abstract - Cited by 176 (1 self) - Add to MetaCart
Although far from optimal, flooding is an indispensable message dissemination technique for network-wide broadcast within mobile ad hoc networks (MANETs). As such, the plain flooding algorithm provokes a high number of unnecessary packet rebroadcasts, causing contention, packet collisions

Routing and Broadcasting in Ad-Hoc Networks

by Der Philosophisch-naturwissenschaftlichen Fakultät, Der Universität Bern, Marc Heissenbüttel, Prof Dr, T. Braun, Der Philosophisch-naturwissenschaftlichen Fakultät, Der Universität Bern, Marc Heissenbüttel, Von Frutigen, Prof Dr, T. Braun
"... I would like to thank Prof. Dr. Torsten Braun, head of the Computer Network and Distributed Systems group (RVS), for supervising this work and for his insightful advises. Prof. Dr. Torsten Braun encouraged and motivated me to publish my research results and he provided me the opportunity to present ..."
Abstract - Add to MetaCart
I would like to thank Prof. Dr. Torsten Braun, head of the Computer Network and Distributed Systems group (RVS), for supervising this work and for his insightful advises. Prof. Dr. Torsten Braun encouraged and motivated me to publish my research results and he provided me the opportunity to present

Impact of Interferences on Connectivity in Ad Hoc Networks

by Olivier Dousse, Francois Baccelli, Patrick Thiran - in Proc. IEEE INFOCOM , 2003
"... We study the impact of interferences on the connectivity of large-scale ad-hoc networks, using percolation theory. We assume that a bi-directional connection can be set up between two nodes if the signal to noise ratio at the receiver is larger than some threshold. The noise is the sum of the contri ..."
Abstract - Cited by 156 (13 self) - Add to MetaCart
We study the impact of interferences on the connectivity of large-scale ad-hoc networks, using percolation theory. We assume that a bi-directional connection can be set up between two nodes if the signal to noise ratio at the receiver is larger than some threshold. The noise is the sum

Broadcasting in Hybrid Ad Hoc Networks

by François Ingelrest, David Simplot-ryl, Ivan Stojmenović - in "Proc. 2nd Annual Conference on Wireless On demand Network Systems and Services (WONS , 2005
"... In this paper, we consider hybrid ad hoc networks, which are composed of two kinds of nodes, regular ones and nodes with additional capabilities. For example, multi-hop cellular and wireless Internet networks consist of static or mobile nodes, and fixed access points which provide an access to an in ..."
Abstract - Cited by 6 (0 self) - Add to MetaCart
In this paper, we consider hybrid ad hoc networks, which are composed of two kinds of nodes, regular ones and nodes with additional capabilities. For example, multi-hop cellular and wireless Internet networks consist of static or mobile nodes, and fixed access points which provide an access

GPS Assisted Broadcasting in Mobile Ad-Hoc Networks

by Alireza Mahdian, Mario Lopez, Chris Gauthierdickey, Shivakant Mishra , 2010
"... Broadcast protocols play a vital role in building services and applications for multihop, mobile, wireless ad hoc networks (MANET). This paper describes the design, implementation and evaluation of a new broadcast protocol for a multihop, mobile wireless ad hoc network that provides significantly be ..."
Abstract - Add to MetaCart
Broadcast protocols play a vital role in building services and applications for multihop, mobile, wireless ad hoc networks (MANET). This paper describes the design, implementation and evaluation of a new broadcast protocol for a multihop, mobile wireless ad hoc network that provides significantly

Broadcasting and activity-scheduling in ad hoc networks

by Ivan Stojmenovic, Jie Wu - Stojmenovic (Eds.), Ad Hoc Networking, IEEE , 2004
"... In a multi-hop wireless network, each node has a transmission radius and is able to send a message to all of its neighbors that are located within the radius. In a flooding or broadcasting task, a source node sends the same message to all the nodes in the network. It is an important task used for pa ..."
Abstract - Cited by 12 (0 self) - Add to MetaCart
In a multi-hop wireless network, each node has a transmission radius and is able to send a message to all of its neighbors that are located within the radius. In a flooding or broadcasting task, a source node sends the same message to all the nodes in the network. It is an important task used

Network Wide Broadcasting Protocols for Mobile Ad Hoc Networks

by Bradley B. Williams, Brad Williams , 2002
"... Network wide broadcasting in Mobile Ad Hoc Networks (MANETs) provides important control and route establishment functionality for a number of unicast and multicast protocols. Considering its wide use as a building block for other network layer protocols, the MANET community needs to standardize a si ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
Network wide broadcasting in Mobile Ad Hoc Networks (MANETs) provides important control and route establishment functionality for a number of unicast and multicast protocols. Considering its wide use as a building block for other network layer protocols, the MANET community needs to standardize a

Routing and broadcasting in hybrid ad hoc and sensor networks

by François Ingelrest, David Simplot-ryl, Ivan Stojmenović - In Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless and Peer-to-Peer Networks, Jie , 2006
"... Hybrid ad hoc networks consist of two kinds of nodes, regular nodes and nodes with additional capabilities. For example, multi-hop cellular and wireless Internet networks consist of static or mobile nodes and access points to a fixed infrastructure. Each node may access fixed infrastructure either d ..."
Abstract - Cited by 6 (2 self) - Add to MetaCart
Hybrid ad hoc networks consist of two kinds of nodes, regular nodes and nodes with additional capabilities. For example, multi-hop cellular and wireless Internet networks consist of static or mobile nodes and access points to a fixed infrastructure. Each node may access fixed infrastructure either

Routing and Broadcasting in Hybrid Ad Hoc Networks

by François Ingelrest, François Ingelrest, David Simplot-ryl, David Simplot-ryl, Ivan Stojmenović, Ivan Stojmenović, Thème Réseaux Et Systèmes - in "Proc. 2nd Annual Conference on Wireless On demand Network Systems and Services (WONS , 2004
"... Hybrid ad hoc networks consist of two kinds of nodes, regular nodes and nodes with additional capabilities. For example, multi-hop cellular and wireless Internet networks consist of static or mobile nodes and access points to a fixed infrastructure. Each node may access fixed infrastructure either d ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Hybrid ad hoc networks consist of two kinds of nodes, regular nodes and nodes with additional capabilities. For example, multi-hop cellular and wireless Internet networks consist of static or mobile nodes and access points to a fixed infrastructure. Each node may access fixed infrastructure either

Securing Mobile Ad Hoc Networks with

by Certificateless Public Keys, Yanchao Zhang, Wei Liu, Wenjing Lou
"... Abstract—This paper studies key management, a fundamental problem in securing mobile ad hoc networks (MANETs). We present IKM, an ID-based key management scheme as a novel combination of ID-based and threshold cryptography. IKM is a certificateless solution in that public keys of mobile nodes are di ..."
Abstract - Add to MetaCart
Abstract—This paper studies key management, a fundamental problem in securing mobile ad hoc networks (MANETs). We present IKM, an ID-based key management scheme as a novel combination of ID-based and threshold cryptography. IKM is a certificateless solution in that public keys of mobile nodes
Next 10 →
Results 1 - 10 of 167
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University