搜索资源列表
Manet-routing
- MANET Routing: Introduction to MANETs & Fundamentals of Wireless Ad Hoc Networks & Routing in MANETs & Properties of MANETs
MANETQoSModel
- manets Quality of serving routing based on ant colony Optimization
01313365
- Its a good paper of Manets
4Vol4No9
- Zone Routing Protocol (ZRP) is a most promising and widely accepted and well proved hybrid routing protocol in Mobile Ad-hoc Networks (MANETs) for its performance when compared with table-driven and on-demand protocols. Our study is based on usin
23178_Opnet_thesis
- OPNET MANETS NETWORKING
srm_ton.pdf
- multicasting routing protocol for manets
function-TDSR
- Ad-hoc networks refer to temporary networks which form for special purposes. Mobile ad-hoc networks (MANETs) are networks which use no network assisting element for routing, but every node has the role of router and actively participates in data
IJCNS20110600007_92739961
- Mobile Ad-Hoc network is a collection of mobile nodes in communication without using infrastructure. De-spite the importance of type of the exchanged data between the knots on the QoS of the MANETs, the mul-tiservice data were not treated by the larg
A-Cluster-Based-Backbone-Infrastructure-for-Broad
- A Cluster-Based Backbone Infrastructure for Broadcasting in MANETs
directional-antennas
- 一些关于无线自组网中定向天线设计方面的英文参考文献,内容齐全,颇具代表性,为学术研究着提供良好的查询途径-Directional antenna design for MANETs representative,which is helpful for academic researchers
manets
- Manets simulation full source code!! Enjoy-Manets simulation full source code!! Enjoy!!!
Improving-Selfish-Node-Detection-in-MANETs-Using-
- document about improving selfish node detection using watchdog
A-Cluster-Based-Distributed-Hierarchical-IDS-for-
- A Cluster-Based Distributed Hierarchical IDS for MANETs
Errack
- SECURE INTRUSION-DETECTIONSYSTEM FOR MANETS Abstract: Our goal is to detect malicious nodes by proposing a new IDS specially designed for MANETs ,which aims to solve receiver collision limited transmission power false misbehavior proble
05898377
- Capacity-Optimized Topology Control for MANETs with Cooperative Communications
karamjeet
- This code is about Security in manets, attack detection is performed the attacks are detected and prevented.
04084934.
- Unlike infrastructure based wireless networks, nodes in mobile ad hoc networks (MANETs) will also have to act as intermediate nodes for data routing. These additional transmissions will further drain the power resources of mobile nodes which
MAODV
- The AODV protocol is considered by some researchers to be the most popular MANET routing protocol, this has lead to many variants and improvements being proposed by researchers to address some of the many issues of wireless MANETs.