Results 321 to 330 of about 355,218 (346)
Some of the next articles are maybe not open access.
Adaptive approaches to relieving broadcast storms in a wireless multihop mobile ad hoc network
Proceedings 21st International Conference on Distributed Computing Systems, 2001Y. Tseng, Sze-Yao Ni, En-Yu Shih
semanticscholar +1 more source
Wireless SDN mobile ad hoc network: From theory to practice
2017 IEEE International Conference on Communications (ICC), 2017Hans C. Yu, Giorgio Quer, R. Rao
semanticscholar +1 more source
MANETconf: configuration of hosts in a mobile ad hoc network
Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies, 2002S. Nesargi, R. Prakash
semanticscholar +1 more source
Security Threats in Mobile Ad Hoc Network
, 2015Kamanashis Biswas, M. Ali
semanticscholar +1 more source
Cross-layering in mobile ad hoc network design
Computer, 2004M. Conti +3 more
semanticscholar +1 more source
IP address assignment in a mobile ad hoc network
MILCOM 2002. Proceedings, 2002Mansoor Mohsin, Ravi Prakash
semanticscholar +1 more source
A performance comparison of energy consumption for Mobile Ad Hoc Network routing protocols
Proceedings of the ... International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, 2000Juan-Carlos Cano, P. Manzoni
semanticscholar +1 more source
Handling Selfishness in Replica Allocation over a Mobile Ad Hoc Network
IEEE Transactions on Mobile Computing, 2012Jae-Ho Choi +3 more
semanticscholar +1 more source
Secrecy in Mobile Ad-hoc Networks [PDF]
We propose a framework for automated verification of secrecy properties of MANET protocols, consisting of a formal language and a proven sound verifi- cation technique which can be automated. We start off by presenting the dis- tributed applied pi calculus with broadcast (DAπβ ), whereafter we summarise our procedure for generating Horn clauses from a ...
Hüttel, Hans, Rafnsson, Willard
openaire

