Performance analysis of the CONFIDANT protocol
Citations
1,430 citations
Cites background or methods from "Performance analysis of the CONFIDA..."
...Most of the solutions, currently available in literature, present a similar approach to the cooperation problem [16,189,192]....
[...]
...The CONFIDANT protocol [16] is an extension to the DSR intended to deal with the routing misbehavior problem....
[...]
1,330 citations
1,188 citations
877 citations
869 citations
References
4,182 citations
"Performance analysis of the CONFIDA..." refers methods in this paper
...1.1 Background: the DSR Protocol Dynamic Source Routing is a protocol developed for routing in mobile ad-hoc networks and was proposed for MANET by Broch, Johnson, and Maltz [8]....
[...]
...[8] Dave B. Johnson and David A. Maltz....
[...]
...Dynamic Source Routing is a protocol developed for routing in mobile ad-hoc networks and was proposed for MANET by Broch, Johnson, and Maltz [8]....
[...]
3,747 citations
2,661 citations
2,593 citations
"Performance analysis of the CONFIDA..." refers methods in this paper
...4.5 Estimation of Factor Relevance In order to .nd out which factors actually have an e.ect on the performance metrics and to reduce the number of experiments, a 2k r factorial design according to Jain [7] was performed, with k (the number of factors) being set to 3 and 5, and r (the number of repetitions of the experiment) set to 10, resulting in 8 and 32 experiments or 80 and 320 simulation runs, respectively....
[...]
...In order to find out which factors actually have an effect on the performance metrics and to reduce the number of experiments, a 2r factorial design according to Jain [7] was performed, with k (the number of factors) being set to 3 and 5, and r (the number of repetitions of the experiment) set to 10, resulting in 8 and 32 experiments or 80 and 320 simulation runs, respectively....
[...]
...[7] Raj Jain....
[...]