Results 1 to 10 of about 238,267 (227)

Cooperation in wireless ad hoc networks [PDF]

open access: yesIEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428), 2003
In wireless ad hoc networks, nodes communicate with far off destinations using intermediate nodes as relays. Since wireless nodes are energy constrained, it may not be in the best interest of a node to always accept relay requests. On the other hand, if all nodes decide not to expend energy in relaying, then network throughput will drop dramatically ...
V. SRINIVASAN   +3 more
openaire   +2 more sources

Wireless Mobile Ad Hoc Networks

open access: yesEURASIP Journal on Wireless Communications and Networking, 2007
Wireless mobile ad hoc networks (MANETs), due to their dynamic nature and due to the unreliability of the wireless medium, pose unique challenges that are significantly more complex than those that arise in traditional wired or even cellular wireless networks.
Hamid R. Sadjadpour   +3 more
doaj   +3 more sources

A Critical Analysis of Cooperative Caching in Ad Hoc Wireless Communication Technologies: Current Challenges and Future Directions [PDF]

open access: yesSensors
The exponential growth of wireless traffic has imposed new technical challenges on the Internet and defined new approaches to dealing with its intensive use.
Muhammad Ali Naeem   +3 more
doaj   +2 more sources

A survey on probabilistic broadcast schemes for wireless ad hoc networks

open access: yesAd Hoc Networks, 2015
Broadcast or flooding is a dissemination technique of paramount importance in wireless ad hoc networks. The broadcast scheme is widely used within routing protocols by a wide range of wireless ad hoc networks such as mobile ad hoc networks, vehicular ad ...
S L Toral   +2 more
exaly   +2 more sources

Intrusion detection in wireless ad-hoc networks

open access: yesProceedings of the 6th annual international conference on Mobile computing and networking, 2000
As the recent denial-of-service attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particularly vulnerable due to its features of open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and lack of a clear ...
Yongguang Zhang, Wenke Lee
openaire   +2 more sources

Wireless Ad Hoc Sensor Networks

open access: yesInternational Journal of Distributed Sensor Networks, 2013
Carlos León   +5 more
doaj   +4 more sources

Classification and comparison of ad hoc networks: A review

open access: yesEgyptian Informatics Journal, 2023
The study of ad hoc networks and their different varieties, including wireless sensor networks, wireless mesh networks, and mobile ad hoc networks, is discussed in this paper. Wireless devices link to one another directly in an ad hoc network without the
Reeya Agrawal   +7 more
doaj   +1 more source

Comparative research on the formation of backbone media of wireless self-organizing network by DLA-GF algorithm and ant colony algorithm

open access: yesAlexandria Engineering Journal, 2022
A mobile ad hoc network is a complicated distributed system organized by mobile terminals or wireless nodes through wireless connections. The mobile ad hoc network is suitable for those who lack basic communication equipment or do not have technical ...
Sihao Li   +3 more
doaj   +1 more source

Robust wireless ad hoc networks [PDF]

open access: yesIEEE International Conference on Communications, 2003. ICC '03., 2003
We consider a large-scale of wireless ad hoc networks whose nodes are distributed randomly in a two-dimensional region /spl Omega/. Given n wireless nodes V, each with transmission range r/sub n/, the wireless networks are often modeled by graph G(V, r/sub n/) in which two nodes are connected if their Euclidean distance is no more than r/sub n/.
Xiang-Yang Li 0001   +4 more
openaire   +1 more source

IEEE Access Special Section Editorial: Flying Ad Hoc Networks: Challenges, Potentials, Future Applications, and Way Forward

open access: yesIEEE Access, 2021
The theory and operations of data dissemination in wireless scenarios have endless applications based on the characteristics of underlying networks.
Omer Chughtai   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy