• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 33,261
Next 10 →

Gossip-based ad hoc routing

by Zygmunt J. Haas, Joseph Y. Halpern, Li Li , 2002
"... Many ad hoc routing protocols are based on some variant of flooding. Despite various optimizations, many routing messages are propagated unnecessarily. We propose a gossiping-based approach, where each node forwards a message with some probability, to reduce the overhead of the routing protocols. G ..."
Abstract - Cited by 379 (4 self) - Add to MetaCart
Many ad hoc routing protocols are based on some variant of flooding. Despite various optimizations, many routing messages are propagated unnecessarily. We propose a gossiping-based approach, where each node forwards a message with some probability, to reduce the overhead of the routing protocols

Geography-informed Energy Conservation for Ad Hoc Routing

by Ya Xu, John Heidemann, Deborah Estrin - ACM MOBICOM , 2001
"... We introduce a geographical adaptive fidelity (GAF) algorithm that reduces energy consumption in ad hoc wireless networks. GAF conserves energy by identifying nodes that are equivalent from a routing perspective and then turning off unnecessary nodes, keeping a constant level of routing fidelity. GA ..."
Abstract - Cited by 1045 (21 self) - Add to MetaCart
We introduce a geographical adaptive fidelity (GAF) algorithm that reduces energy consumption in ad hoc wireless networks. GAF conserves energy by identifying nodes that are equivalent from a routing perspective and then turning off unnecessary nodes, keeping a constant level of routing fidelity

Geometric Ad-Hoc Routing: Of Theory and Practice

by Fabian Kuhn, Roger Wattenhofer, Yan Zhang, Aaron Zollinger , 2003
"... All too often a seemingly insurmountable divide between theory and practice can be witnessed. In this paper we try to contribute to narrowing this gap in the field of ad-hoc routing. In particular we consider two aspects: We propose a new geometric routing algorithm which is outstandingly efficient ..."
Abstract - Cited by 317 (13 self) - Add to MetaCart
All too often a seemingly insurmountable divide between theory and practice can be witnessed. In this paper we try to contribute to narrowing this gap in the field of ad-hoc routing. In particular we consider two aspects: We propose a new geometric routing algorithm which is outstandingly efficient

Security-Aware Ad hoc Routing for Wireless Networks

by Seung Yi, Prasad Naldurg, Robin Kravets , 2001
"... We propose a new routing technique called Security-Aware ad hoc Routing (SAR) that incorporates security attributes as parameters into ad hoc route discovery. SAR enables the use of security as a negotiable metric to improve the relevance of the routes discovered by ad hoc routing protocols. We deve ..."
Abstract - Cited by 162 (0 self) - Add to MetaCart
We propose a new routing technique called Security-Aware ad hoc Routing (SAR) that incorporates security attributes as parameters into ad hoc route discovery. SAR enables the use of security as a negotiable metric to improve the relevance of the routes discovered by ad hoc routing protocols. We

Ad Hoc Routing Protocol Validation

by Oskar Wibling, Oskar Wibling, Oskar Wibling , 2005
"... We explore and evaluate methods for validation of ad hoc routing protocols which are used to set up forwarding paths in spontaneous networks of mobile devices. The focus is automatic formal verification but we also make an initial account of a protocol performance comparison using structured live te ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
We explore and evaluate methods for validation of ad hoc routing protocols which are used to set up forwarding paths in spontaneous networks of mobile devices. The focus is automatic formal verification but we also make an initial account of a protocol performance comparison using structured live

Ad-hoc Routing Abstract

by Knut-helge Vik, Knut-helge Vik , 2004
"... The members of the Committee appointed to examine the thesis of KNUT-HELGE VIK find it satisfactory and recommend that it be accepted. ii Chair ACKNOWLEDGEMENT I would like to acknowledge my advisor Sirisha Medidi, for all her help and valuable input. I would also like to acknowledge all the members ..."
Abstract - Add to MetaCart
The members of the Committee appointed to examine the thesis of KNUT-HELGE VIK find it satisfactory and recommend that it be accepted. ii Chair ACKNOWLEDGEMENT I would like to acknowledge my advisor Sirisha Medidi, for all her help and valuable input. I would also like to acknowledge all the members of the Washington State Networking and Security Research Group. I would not have been able to complete my Master’s degree without the help of my fellow students. Thank you all for your support. iii

On the Scalability of Ad Hoc Routing Protocols

by Cesar A. Santivanez, Bruce Mcdonald, Ioannis Stavrakakis, Ram Ramanathan - in Proc. of IEEE Infocom , 2002
"... A novel framework is presented for the study of scalability in ad hoc networks. Using this framework, the first asymptotic analysis is provided with respect to network size, mobility, and traffic for each fundamental class of ad hoc routing algorithms. Protocols studied include the following: Plain ..."
Abstract - Cited by 60 (1 self) - Add to MetaCart
A novel framework is presented for the study of scalability in ad hoc networks. Using this framework, the first asymptotic analysis is provided with respect to network size, mobility, and traffic for each fundamental class of ad hoc routing algorithms. Protocols studied include the following: Plain

Security Enhanced Ad hoc Routing

by Salar Mohammad, Sk. Mahaboob Ali, Mohd Haji
"... Abstract—In present era the Security has become one of the major issues for data communication over wired and wireless networks. Apart from the earlier work on the designs of cryptography algorithms and system infrastructures, we will propose an ad hoc routing algorithm that could randomize delivery ..."
Abstract - Add to MetaCart
Abstract—In present era the Security has become one of the major issues for data communication over wired and wireless networks. Apart from the earlier work on the designs of cryptography algorithms and system infrastructures, we will propose an ad hoc routing algorithm that could randomize

CEDAR: a Core-Extraction Distributed Ad hoc Routing Algorithm

by Prasun Sinha, Raghupathy Sivakumar, Vaduvur Bharghavan - IEEE Journal on Selected Areas in Communications , 1999
"... Absiract—CEDARis an algorithm for QoS routing in ad hoc network environments. It has three key components: (a) the establishment and main-tenance of a setf-organizing routing infrastructure catted the core for per-forming route computations, (b) the propagation of the link-state of stable high-bandw ..."
Abstract - Cited by 397 (10 self) - Add to MetaCart
Absiract—CEDARis an algorithm for QoS routing in ad hoc network environments. It has three key components: (a) the establishment and main-tenance of a setf-organizing routing infrastructure catted the core for per-forming route computations, (b) the propagation of the link-state of stable high

A Scalable Location Service for Geographic Ad Hoc Routing,”

by Jinyang Li , John Jannotti , Douglas S J De Couto , David R Karger , Robert Morris , Jinyang Li , John Jannotti , Alfred P Sloane , Foundation Fellowship , Lucille Packard , Foundations Fellowship , Jinyang 46 , John Li , Jannotti - Proceedings of ACM/IEEE MobiCom , 2000
"... Abstract. GLS is a new distributed location service which tracks mobile node locations. GLS combined with geographic forwarding allows the construction of ad hoc mobile networks that scale to a larger number of nodes than possible with previous work. GLS is decentralized and runs on the mobile node ..."
Abstract - Cited by 769 (17 self) - Add to MetaCart
Abstract. GLS is a new distributed location service which tracks mobile node locations. GLS combined with geographic forwarding allows the construction of ad hoc mobile networks that scale to a larger number of nodes than possible with previous work. GLS is decentralized and runs on the mobile
Next 10 →
Results 1 - 10 of 33,261
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University