Source routing

Results: 206



#Item
41How to Misuse AODV: A Case Study of Insider Attacks against Mobile Ad-Hoc Routing Protocols 1,2 Peng Ning and Kun Sun Cyber Defense Laboratory, Computer Science Department, North Carolina State University, Raleigh, NC 27

How to Misuse AODV: A Case Study of Insider Attacks against Mobile Ad-Hoc Routing Protocols 1,2 Peng Ning and Kun Sun Cyber Defense Laboratory, Computer Science Department, North Carolina State University, Raleigh, NC 27

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:25:59
42WRES 3180 Project Report SessionBANDWIDTH ALLOCATION PREDICTION FOR ADHOC NETWORK

WRES 3180 Project Report SessionBANDWIDTH ALLOCATION PREDICTION FOR ADHOC NETWORK

Add to Reading List

Source URL: dspace.fsktm.um.edu.my

Language: English - Date: 2011-04-05 04:40:55
43Location-Aided Routing (LAR) in Mobile Ad Hoc Networks Young-Bae Ko and Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, TX

Location-Aided Routing (LAR) in Mobile Ad Hoc Networks Young-Bae Ko and Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, TX

Add to Reading List

Source URL: www.sigmobile.org

Language: English - Date: 2013-08-14 12:38:30
44University of California Los Angeles Routing and Multicasting Strategies in Wireless Mobile Ad hoc Networks A dissertation submitted in partial satisfaction

University of California Los Angeles Routing and Multicasting Strategies in Wireless Mobile Ad hoc Networks A dissertation submitted in partial satisfaction

Add to Reading List

Source URL: www.sigmobile.org

Language: English - Date: 2013-08-14 12:38:09
45Departmental Secure MICR Printer User’s Guide Source Technologies, IncWhitehall Park Drive

Departmental Secure MICR Printer User’s Guide Source Technologies, IncWhitehall Park Drive

Add to Reading List

Source URL: www.sourcetech.com

Language: English - Date: 2014-09-22 16:37:14
46AN ARCHITECTURE FOR A CAMPUS-SIZED WIRELESS MOBILE NETWORK A Thesis Submitted to the Faculty of Purdue University

AN ARCHITECTURE FOR A CAMPUS-SIZED WIRELESS MOBILE NETWORK A Thesis Submitted to the Faculty of Purdue University

Add to Reading List

Source URL: www.sigmobile.org

Language: English - Date: 2013-08-14 12:38:09
47Survivability in Wireless Networks: A Case for Overhead Reduction Axel W. Krings University of Idaho Moscow, Idaho, USA Abstract: A link scheduling model is presented that utilizes primary-backup scheduling fo

Survivability in Wireless Networks: A Case for Overhead Reduction Axel W. Krings University of Idaho Moscow, Idaho, USA Abstract: A link scheduling model is presented that utilizes primary-backup scheduling fo

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-04-12 15:47:02
48Secure Reporting of Traffic Forwarding Activity in Mobile Ad Hoc Networks Heesook Choi, William Enck, Jaesheung Shin, Patrick McDaniel, Thomas F. La Porta Department of Computer Science and Engineering Pennsylvania State

Secure Reporting of Traffic Forwarding Activity in Mobile Ad Hoc Networks Heesook Choi, William Enck, Jaesheung Shin, Patrick McDaniel, Thomas F. La Porta Department of Computer Science and Engineering Pennsylvania State

Add to Reading List

Source URL: www.enck.org

Language: English
491  Multiple Source Internet Tomography Mark J. Coates, Michael G. Rabbat, and Robert D. Nowak  Abstract— Information about the topology and link-level characteristics of a network is critical for many applications incl

1 Multiple Source Internet Tomography Mark J. Coates, Michael G. Rabbat, and Robert D. Nowak Abstract— Information about the topology and link-level characteristics of a network is critical for many applications incl

Add to Reading List

Source URL: www.tsp.ece.mcgill.ca

Language: English - Date: 2006-07-13 16:30:01
50REAct: Resource-Efficient Accountability for Node Misbehavior in Ad Hoc Networks based on Random Audits William Kozma Jr. University of Arizona Electrical and Computer Engineering Dept.

REAct: Resource-Efficient Accountability for Node Misbehavior in Ad Hoc Networks based on Random Audits William Kozma Jr. University of Arizona Electrical and Computer Engineering Dept.

Add to Reading List

Source URL: www2.engr.arizona.edu

Language: English - Date: 2009-03-14 14:27:00