Topology information generation methods using a routing table in ad hoc network applications
Abstract
References
Index Terms
- Topology information generation methods using a routing table in ad hoc network applications
Recommendations
A Routing Protocol Based on Adjacency Matrix in Ad Hoc Mobile Networks
ALPIT '08: Proceedings of the 2008 International Conference on Advanced Language Processing and Web Information TechnologyAd hoc network is self-organized network which distinguished by the randomly changing topology. So the routing protocol for ad hoc wireless network must be adaptive to frequent topology changes caused by the nodes mobility. But if every node maintains ...
Routing Protocol Based on CDSE Virtual Topology in Ad Hoc Network
This paper describes the Connected Dominating Set-Energy Protocol (CDSEP) for mobile ad hoc networks. The key concept used in the protocol is a new algorithm to construct Connected Dominating Set based on Energy and Connectivity (CDSE). This algorithm ...
Providing Fault-Tolerant Ad hoc Routing Service in Adversarial Environments
Most existing designs of ad hoc networks are based on the assumption of non-adversarial environments, where each node in the network is cooperative and well-behaved. When misbehaving nodes exist in the network, the performance of current routing ...
Comments
Information & Contributors
Information
Published In
![cover image ACM Conferences](/cms/asset/b305947a-8850-40ec-9d43-99e9632eeb6d/1244002.cover.jpg)
- Conference Chairs:
- Yookun Cho,
- Roger L. Wainwright,
- Hisham M. Haddad,
- Sung Y. Shin,
- Program Chair:
- Yong Wan Koo
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Article
Conference
Acceptance Rates
Upcoming Conference
- Sponsor:
- sigapp
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 184Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in