𝔖 Bobbio Scriptorium
✦   LIBER   ✦

[Lecture Notes in Computer Science] Mobile Ad-hoc and Sensor Networks Volume 4325 || Data Replication in Mobile Ad Hoc Networks

✍ Scribed by Cao, Jiannong; Stojmenovic, Ivan; Jia, Xiaohua; Das, Sajal K.


Book ID
111921553
Publisher
Springer Berlin Heidelberg
Year
2006
Weight
272 KB
Category
Article
ISBN
3540499334

No coin nor oath required. For personal study only.


πŸ“œ SIMILAR VOLUMES


[Lecture Notes in Computer Science] Ad-H
✍ Syrotiuk, Violet R.; ChΓ‘vez, Edgar πŸ“‚ Article πŸ“… 2005 πŸ› Springer Berlin Heidelberg 🌐 German βš– 170 KB

This Book Constitutes The Refereed Proceedings Of The 4th International Conference On Ad-hoc Networks And Wireless, Adhoinow 2005, Held In Cancun, Mexico In October 2005. The 27 Revised Full Papers Presented Together With The Abstracts Of 2 Invited Talks Were Carefully Reviewed And Selected From Ove

Topology and mobility considerations in
✍ Brent Ishibashi; Raouf Boutaba πŸ“‚ Article πŸ“… 2005 πŸ› Elsevier Science 🌐 English βš– 367 KB

A highly dynamic topology is a distinguishing feature and challenge of a mobile ad hoc network. Links between nodes are created and broken, as the nodes move within the network. This node mobility affects not only the source and/or destination, as in a conventional wireless network, but also interme

Load balancing and resource reservation
✍ Gautam Chakrabarti; Sandeep Kulkarni πŸ“‚ Article πŸ“… 2006 πŸ› Elsevier Science 🌐 English βš– 384 KB

To ensure uninterrupted communication in a mobile ad hoc network, efficient route discovery is crucial when nodes move and/or fail. Hence, protocols such as Dynamic Source Routing (DSR) precompute alternate routes before a node moves and/or fails. In this paper, we modify the way these alternate rou

Detecting unauthorized and compromised n
✍ Nikos Komninos; Dimitris Vergados; Christos Douligeris πŸ“‚ Article πŸ“… 2007 πŸ› Elsevier Science 🌐 English βš– 246 KB

Security of mobile ad hoc networks (MANET) has become a more sophisticated problem than security in other networks, due to the open nature and the lack of infrastructure of such networks. In this paper, the security challenges in intrusion detection and authentication are identified and the differen