A unified study of epidemic routing protocols and their enhancements

Z Feng, KW Chin - 2012 IEEE 26th International Parallel and …, 2012 - ieeexplore.ieee.org
Epidemic protocols belong to a class of routing paradigm that have wide ranging
applications in Delay Tolerant Networks (DTNs) due to their simplicity, low delays, and little …

Two-terminal reliability of a mobile ad hoc network under the asymptotic spatial distribution of the random waypoint model

B Chen, A Phillips, TI Matis - Reliability Engineering & System Safety, 2012 - Elsevier
The random waypoint (RWP) mobility model is frequently used in describing the movement
pattern of mobile users in a mobile ad hoc network (MANET). As the asymptotic spatial …

Closing the Pandora's box: Defenses for thwarting epidemic outbreaks in mobile adhoc networks

R Potharaju, E Hoque, C Nita-Rotaru… - 2012 IEEE 9th …, 2012 - ieeexplore.ieee.org
The openness of the Android operating system increased the number of applications
developed, but it also introduced a new propagation vector for mobile malware. We model …

Data dissemination in delay tolerant networks

Z Feng - 2012 - ro.uow.edu.au
Abstract Delay Tolerant Networks (DTNs) are characterized by large delays, frequent dis-
ruptions and lack of contemporaneous paths between nodes. Moreover, nodes may have …

[PDF][PDF] Improving the credibility of simulation-based research in mobile networks

A Munjal - 2012-Mines Theses & Dissertations, 2012 - repository.mines.edu
This dissertation focuses on improving the credibility of simulation-based re search in mobile
networks. Simulations are typically the only tools available for the performance analysis of a …

Localization algorithm for mobile sensor networks under the random walk model

GY Chang, DW Chiou - 2012 12th International Conference on …, 2012 - ieeexplore.ieee.org
In wireless sensor network (WSN), location information is required to achieve the goal in
many applications. Most of existing localization algorithms for mobile sensor networks are …

Closing the Pandora's box: Defenses for thwarting epidemic outbreaks in mobile adhoc networks

SS Venkatesh, S Sarkar, C Nita-Rotaru… - 2012 IEEE 9th …, 2012 - computer.org
The openness of the Android operating system increased the number of applications
developed, but it also introduced a new propagation vector for mobile malware. We model …

[PDF][PDF] Application of Graph Abstraction for Performance Optimization of Wireless Ad Hoc Networks: Two Node Scenarios

MM Khan - International Journal of Computer Applications, 2012 - Citeseer
This paper examines the feasibility and efficiency of representation of wireless networks
using graph abstractions. These abstractions represent wireless nodes and interactions …

Enhancement of Mobile Ad-hoc Network Models by Using Realistic Mobility and Access Control Mechanisms

N Sabah - 2012 - i-rep.emu.edu.tr
ABSTRACT A mobile ad-hoc network (MANET) is a collection of wireless mobile nodes
forming a temporary network without the need for base stations or any other preexisting …