Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,434,836 papers from all fields of science
Search
Sign In
Create Free Account
Routing
Known as:
External gateway protocol
, Network routing method
, Routing information
Expand
Routing is the process of selecting best paths in a network. Routing is performed for many kinds of networks, including the public switched telephone…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Artificial ants
Bridging (networking)
Chernoff bound
Constraint graph (layout)
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
Eaack- A Secure Intrusion Detection System for Manets
Dr. K. Selvakumar
,
G. Revathi
,
V. Murugan
2015
Corpus ID: 61491975
Article history: Received 12 October 2014 Received in revised form 26 December 2014 Accepted 1 January 2015 Available online 25…
Expand
Highly Cited
2011
Highly Cited
2011
IMPACT OF SELFISH NODE CONCENTRATION IN MANET S
Shailender Gupta
,
C. K. Nagpal
,
Charu Singla
2011
Corpus ID: 18627725
The communication in Mobile Ad hoc Network (MANET) is multi-hop in nature wherein each node relays data packets of other nodes…
Expand
Highly Cited
2011
Highly Cited
2011
A Study on Wormhole Attacks in MANET
Reshmi Maulik
,
N. Chaki
2011
Corpus ID: 15026022
An Ad-hoc network is a self-organized network, without a central coordinator, and which frequently changes its topology. In this…
Expand
2005
2005
Distributed Hash Tables
Klaus Wehrle
,
S. Götz
,
S. Rieche
Peer-to-Peer Systems and Applications
2005
Corpus ID: 5261179
In the last few years, an increasing number of massively distributed systems with millions of participants has emerged within…
Expand
Highly Cited
2002
Highly Cited
2002
Prevention of denial of service attacks and selfishness in mobile ad hoc networks
Pietro Michiardi
2002
Corpus ID: 16734073
Countermeasures against denial of service attacks and node misbehaviour are mandatory requirements in MANET. Essential network…
Expand
Highly Cited
2001
Highly Cited
2001
Overlay Networks A Scalable Alternative for P 2
2001
Corpus ID: 10573364
P eer-to-peer systems are distributed systems that operate without centralized organization or control. To find a particular…
Expand
Highly Cited
2001
Highly Cited
2001
Scalable Web server cluster design with workload-aware request distribution strategy WARD
L. Cherkasova
,
M. Karlsson
Proceedings Third International Workshop on…
2001
Corpus ID: 10941306
We consider a Web cluster in which the content-aware distribution is performed by each of the nodes in a Web cluster. Each server…
Expand
Review
2000
Review
2000
Algorithms for the Logical Topology Design in Wdm All-optical Networks
M. Mellia
2000
Corpus ID: 17478035
In this paper we discuss the optimal design of logical topologies in all-optical WDM networks. We rst explain the key aspects of…
Expand
Highly Cited
2000
Highly Cited
2000
Transmission power control for multiple access wireless packet networks
J. Monks
,
V. Bharghavan
,
Wen-mei W. Hwu
Proceedings 25th Annual IEEE Conference on Local…
2000
Corpus ID: 1149118
Multiple access-based collision avoidance MAC protocols have typically used fixed transmission power and have not considered…
Expand
1994
1994
Unifying FPGAs and SIMD Arrays
Michael Bolotski
,
A. Dehon
,
Jr Thomas F. Knight
,
Jonathan Rose
1994
Corpus ID: 15068674
Field-Programmable Gate Arrays (FPGAs) and Single-Instruction Multiple-Data (SIMD) processing arrays share many architectural…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required