Routing in Ad Hoc Networks - Woo - 1999 () Citation Context ...ode’s remaining energy and transmission power levels. A static table is used since reluctance assignments are not linear as will be explained below. The term reluctance was used by Singh, et al. [59] =-=[70]-=- to ...
Routing in Ad Hoc Networks 来自 World Scientific 喜欢 0 阅读量: 53 作者: Seung-Chul Woo 摘要: The following sections are included:IntroductionTopology-Based versus Position-Based ApproachesTopology-Based Routing ProtocolsProactive Routing ApproachDestination-Sequenced Distance-Vector ProtocolThe Wireless ...
(2002). Routing in ad hoc networks. In Proceedings of the IEEE InternationalConferenceonSystems,Manand Cybernetics (Vol. 2, pp. 291-295).G.V.S. Raju and G. Hernandez, "Routing in Ad hoc networks", in proceedings of the IEEE-SMC International Conference,...
Routing in wireless ad-hoc networks is one of the fundamental tasks which helps nodes send and receive packets. Traditionally, routing protocols for wireless ad-hoc networks assume a non-adversarial and a cooperative network setting. In practice, there may be malicious nodes that may attempt to d...
Bansal, NikhilLiu, ZhenLi Xue-fei,Laurie Cuthbert.On-demand Node-Disjoint Multipath.Routing in wireless Ad hoc networks[C].Proceedings of IEEE Local Computer Networks (LCN),November 2004:19-20.US7808939 * Mar 28, 2003 Oct 5, 2010 Lenovo (Singapore) Pte Ltd. Routing in wireless ad-hoc ...
(2005). Enhancing the Security of On-demand Routing in Ad Hoc Networks. In: Syrotiuk, V.R., Chávez, E. (eds) Ad-Hoc, Mobile, and Wireless Networks. ADHOC-NOW 2005. Lecture Notes in Computer Science, vol 3738. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11561354_15 ...
The goal of this paper is to review the collection of technologies which have been proposed for routing in ad hoc networks. There are literally hundreds of different ad hoc routing protocols proposed. We strive not for a simple enumeration of this extensive literature, but we try to uncover th...
L. Bononi and C. Tacconi. A wireless intrusion detection system for secure cluster- ing and routing in ad hoc networks. In Proceedings of 9th Springer International Conference on Information Security, pages 398-414, 2006.Bononi, L., Tacconi, C.: A wireless intru...
Hierarchical routing in ad hoc networks using k-dominating sets In this article, the notion of a k-SPR set from previous work is extended to the context of an edge-weighted graph. Under a reasonable assumption, such a set is still k-dominating, and k-hop connected. When a decreasing sequ...
A ROUTING METHOD IN MOBILE AD-HOC NETWORKS USING DISTRIBUTED ARTIFICIAL INTELLIGENCE TECHNICS In this paper, we propose a proactive routing algorithm for wireless adhoc networks based on swarm intelligence and reinforcement learning. The proposed algorithm, decreases the packet delays in network, lowers...