Reliable broadcast in mobile multihop packet networks
MobiCom '97 Proceedings of the 3rd annual ACM/IEEE international conference on Mobile computing and networking
Performance evaluation of the MoM mobile multicast protocol
Mobile Networks and Applications - Special issue on protocols and software paradigms of mobile networks
Directed diffusion: a scalable and robust communication paradigm for sensor networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Profile-Based Protocols in Wireless Mobile Ad Hoc Networks
LCN '01 Proceedings of the 26th Annual IEEE Conference on Local Computer Networks
Independent-tree ad hoc multicast routing (ITAMAR)
Mobile Networks and Applications
Spatiotemporal multicast in sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
An adaptive strategy for maximizing throughput in MAC layer wireless multicast
Proceedings of the 5th ACM international symposium on Mobile ad hoc networking and computing
Efficient Dissemination of Personalized Information Using Content-Based Multicast
IEEE Transactions on Mobile Computing
A Scalable and Reliable Multicast Routing Protocol for Ad-hoc Wireless Networks
Wireless Personal Communications: An International Journal
Middleware for protocol-based coordination in dynamic networks
MPAC '05 Proceedings of the 3rd international workshop on Middleware for pervasive and ad-hoc computing
FAR: Face-aware routing for mobicast in large-scale sensor networks
ACM Transactions on Sensor Networks (TOSN)
An autonomic routing framework for sensor networks
Cluster Computing
Epidemic-based approaches for reliable multicast in mobile ad hoc networks
ACM SIGOPS Operating Systems Review
Scalable logical coordinates framework for routing in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
EgoSpaces: Facilitating Rapid Development of Context-Aware Mobile Applications
IEEE Transactions on Software Engineering
EHAC'08 Proceedings of the 7th WSEAS International Conference on Electronics, Hardware, Wireless and Optical Communications
High throughput MAC layer multicasting over time-varying channels
Computer Communications
Epidemic-based reliable and adaptive multicast for mobile ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Programming pervasive and mobile computing applications: The TOTA approach
ACM Transactions on Software Engineering and Methodology (TOSEM)
Building programmable routing service for sensor networks
Computer Communications
Context-aware publish subscribe in mobile ad hoc networks
COORDINATION'07 Proceedings of the 9th international conference on Coordination models and languages
Mobicast: just-in-time multicast for sensor networks under spatiotemporal constraints
IPSN'03 Proceedings of the 2nd international conference on Information processing in sensor networks
Survey Paper: Routing protocols in ad hoc networks: A survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Survey paper: A survey on routing algorithms for wireless Ad-Hoc and mesh networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Supporting context-aware interaction in dynamic multi-agent systems
E4MAS'04 Proceedings of the First international conference on Environments for Multi-Agent Systems
MADServer: a server architecture for mobile advanced delivery
Proceedings of the seventh ACM international workshop on Challenged networks
Hi-index | 0.00 |
This paper presents a radically new multicast model for ad hoc wireless networks. In this model, the content of the multicast data determines the receiver set for the data and the receiver set changes dynamically as the content of the multicast changes. Delivering the multicast to intended receivers while minimizing the message overhead and reducing battery consumption is a challenge made harder because of node mobility. In this paper we develop a novel multicast model that distributes this form of threat information in a message efficient manner. We present results from detailed simulations that demonstrate the efficiency of our protocol and discus the scalability of this model to larger networks.