By Topic

Ad Hoc Networking Workshop, 2009. Med-Hoc-Net 2009. 8th IFIP Annual Mediterranean

Date June 29 2009-July 1 2009

Filter Results

Displaying Results 1 - 13 of 13
  • [Front matter]

    Publication Year: 2009, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (32 KB)
    Freely Available from IEEE
  • Welcome

    Publication Year: 2009, Page(s): ii
    Request permission for commercial reuse | PDF file iconPDF (429 KB) | HTML iconHTML
    Freely Available from IEEE
  • Program

    Publication Year: 2009, Page(s):iii - vii
    Request permission for commercial reuse | PDF file iconPDF (487 KB)
    Freely Available from IEEE
  • Committees

    Publication Year: 2009, Page(s):viii - ix
    Request permission for commercial reuse | PDF file iconPDF (431 KB)
    Freely Available from IEEE
  • CORP: Cooperative rateless code protocol for vehicular content dissemination

    Publication Year: 2009, Page(s):1 - 7
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (302 KB) | HTML iconHTML

    Data dissemination in vehicular networks has been a challenge due to unpredictable network dynamics and channel unreliability. In fact, conventional approaches that rely on TCP or UDP do not perform well and cannot consistently guarantee reliable communications. A potential solution to these problems involves using erasure-correcting codes to make UDP transmissions reliable. However, it is also im... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Random access wireless networks with controlled mobility

    Publication Year: 2009, Page(s):8 - 14
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB) | HTML iconHTML

    This paper considers wireless networks where messages arriving randomly (in time and space) are collected by a mobile receiver. The messages are transmitted to the mobile receiver according to a random access scheme and the receiver dynamically adjusts its position in order to receive these messages in minimum time. We investigate the use of wireless transmission and controlled mobility to improve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Preventing Layer-3 wormhole attacks in ad-hoc networks with multipath DSR

    Publication Year: 2009, Page(s):15 - 20
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (290 KB) | HTML iconHTML

    Wormhole attacks in ad-hoc networks have been attracting much attention over the years. They consist in two malicious nodes tunneling traffic from one end of the network to the other. Several approaches are proposed to detect these attacks but only few solutions exploit the information provided by multipath routing schemes. A new approach detecting wormhole attacks is presented in this paper. The ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extrapolation-based and QoS-aware real-time communication in wireless mobile ad hoc networks

    Publication Year: 2009, Page(s):21 - 26
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (386 KB) | HTML iconHTML

    In mobile ad hoc networks (MANETs), it is increasingly important to devote attention to real-time and quality of service (QoS) issues. We present here a novel extrapolation-based and QoS-aware technology for providing soft real-time services in MANETs. The proposed technology combines elements of proactive and location-based techniques. Each node maintains a global view, which is periodically upda... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TDCS: A new mechanism for automatic channel assignment for independent IEEE 802.11 networks

    Publication Year: 2009, Page(s):27 - 33
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (353 KB) | HTML iconHTML

    In the last few years, IEEE 802.11 applications has experienced a significant growth. This expansion creates scenarios where distinct administrators manage wireless networks. These scenarios lack of a unique authority to perform an adequate channel allocation that minimizes the performance degradation generated by medium access sharing and co-channel interference. This work proposes a new dynamic ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Throughput-capacity and bit-per-joule performance of IEEE 802.11 based wireless mesh networks

    Publication Year: 2009, Page(s):34 - 41
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (498 KB) | HTML iconHTML

    Energy consumption is of utmost importance in wireless mesh networks where nodes are battery operated and have limited power resources. In this paper, we develop an analytical model to estimate the throughput-capacity of a wireless mesh network and use this model to study the network's bit-per-joule performance. We assume that each node uses an IEEE 802.11 based software controlled radio whose mod... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalable communication cost reduction: The Chord case

    Publication Year: 2009, Page(s):42 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (332 KB) | HTML iconHTML

    In peer-to-peer (P2P) network system design a main focus is on efficient service discovery schemes, most frequently assuming permanent (or long-term stationary) positions for service facilities, neglecting communication costs due to the actual locations of the facilities. Since the problem of communication cost minimization is a large optimization problem (NP-hard) and requires global information ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel routing algorithm based on chord for hybrid wireless ad-hoc networks

    Publication Year: 2009, Page(s):48 - 53
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (343 KB) | HTML iconHTML

    The scale of network and bandwidth of link have been limited by current routing technologies in hybrid wireless ad-hoc networks, so we present a new routing algorithm. In the routing algorithm, the routing information is treated as a resource, and it can be stored and searched in a distributed way with Chord. The routing of data packet prefers to forward by infrastructure. In comparison with OLSR,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Content-based routing using subpart orthogonal codes

    Publication Year: 2009, Page(s):54 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (422 KB) | HTML iconHTML

    We study the use of orthogonal codes as alternative to Bloom filters in content-based routing. In particular we explore the trade-off between centralized solutions using regular orthogonal codes and generating codes locally by hashing. We demonstrate that introduction of subpart orthogonal codes allows distributed operation while leading to shorter key lengths than Bloom filters with the same prob... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.