Ad hoc On-Demand Distance Vector Routing

Results: 102



#Item
1Link-Quality Aware Ad Hoc On-Demand Distance Vector Routing P rotocol Hsin-Mu Tsai, Nawaporn Wisitpongphan and Ozan K. Tonguz C arne gie Me llon U niv e rsity , D e pt. of E le c tric al and C om pute r E ngine e ring Pi

Link-Quality Aware Ad Hoc On-Demand Distance Vector Routing P rotocol Hsin-Mu Tsai, Nawaporn Wisitpongphan and Ozan K. Tonguz C arne gie Me llon U niv e rsity , D e pt. of E le c tric al and C om pute r E ngine e ring Pi

Add to Reading List

Source URL: www.csie.ntu.edu.tw

- Date: 2014-04-11 22:49:01
    2Emmanouil Panaousis | CV Lewes Road – Brighton, BN2 4GJ – UK T +2433 • B  Í www.panaousis.com  Experience

    Emmanouil Panaousis | CV Lewes Road – Brighton, BN2 4GJ – UK T +2433 • B Í www.panaousis.com Experience

    Add to Reading List

    Source URL: www.panaousis.com

    Language: English - Date: 2016-02-25 16:45:41
    3SEDIRAN - Service Discovery and Interaction with Routing Protocols in Ad hoc Network

    SEDIRAN - Service Discovery and Interaction with Routing Protocols in Ad hoc Network

    Add to Reading List

    Source URL: intra.info.uqam.ca

    Language: English - Date: 2009-08-04 12:55:07
    4DCAR: Distributed Coding-Aware Routing in Wireless Networks John C.S. Lui∗ Dah-Ming Chiu+ Science & Engineering Department + Information Engineering Department The Chinese University of Hong Kong

    DCAR: Distributed Coding-Aware Routing in Wireless Networks John C.S. Lui∗ Dah-Ming Chiu+ Science & Engineering Department + Information Engineering Department The Chinese University of Hong Kong

    Add to Reading List

    Source URL: www.cs.cuhk.hk

    Language: English - Date: 2011-03-31 07:53:30
    51  Authenticated Routing for Ad hoc Networks Kimaya Sanzgiri  Brian Neil Levine

    1 Authenticated Routing for Ad hoc Networks Kimaya Sanzgiri  Brian Neil Levine

    Add to Reading List

    Source URL: www.dsm.fordham.edu

    Language: English - Date: 2007-03-10 14:28:30
    6How to Misuse AODV: A Case Study of Insider Attacks against Mobile Ad-Hoc Routing Protocols 1,2 Peng Ning and Kun Sun Cyber Defense Laboratory, Computer Science Department, North Carolina State University, Raleigh, NC 27

    How to Misuse AODV: A Case Study of Insider Attacks against Mobile Ad-Hoc Routing Protocols 1,2 Peng Ning and Kun Sun Cyber Defense Laboratory, Computer Science Department, North Carolina State University, Raleigh, NC 27

    Add to Reading List

    Source URL: discovery.csc.ncsu.edu

    Language: English - Date: 2011-11-09 13:25:59
    7Location-Aided Routing (LAR) in Mobile Ad Hoc Networks Young-Bae Ko and Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, TX

    Location-Aided Routing (LAR) in Mobile Ad Hoc Networks Young-Bae Ko and Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, TX

    Add to Reading List

    Source URL: www.sigmobile.org

    Language: English - Date: 2013-08-14 12:38:30
    8Secure Reporting of Traffic Forwarding Activity in Mobile Ad Hoc Networks Heesook Choi, William Enck, Jaesheung Shin, Patrick McDaniel, Thomas F. La Porta Department of Computer Science and Engineering Pennsylvania State

    Secure Reporting of Traffic Forwarding Activity in Mobile Ad Hoc Networks Heesook Choi, William Enck, Jaesheung Shin, Patrick McDaniel, Thomas F. La Porta Department of Computer Science and Engineering Pennsylvania State

    Add to Reading List

    Source URL: www.enck.org

    Language: English
    9DETECTION AND ISOLATION OF PACKET DROPPERS IN WIRELESS AD-HOC NETWORKS by Yu Zhang  A Thesis Submitted to the Faculty of the

    DETECTION AND ISOLATION OF PACKET DROPPERS IN WIRELESS AD-HOC NETWORKS by Yu Zhang A Thesis Submitted to the Faculty of the

    Add to Reading List

    Source URL: www2.engr.arizona.edu

    Language: English - Date: 2011-10-24 19:38:13
    101  Selective Jamming/Dropping Insider Attacks in Wireless Mesh Networks Loukas Lazos, and Marwan Krunz Dept. of Electrical and Computer Engineering, University of Arizona, Tucson, Arizona

    1 Selective Jamming/Dropping Insider Attacks in Wireless Mesh Networks Loukas Lazos, and Marwan Krunz Dept. of Electrical and Computer Engineering, University of Arizona, Tucson, Arizona

    Add to Reading List

    Source URL: www2.engr.arizona.edu

    Language: English - Date: 2010-11-04 19:12:10