Sciweavers

28 search results - page 5 / 6
» Challenging benchmark for location discovery in ad hoc netwo...
Sort
View
JSAC
2006
156views more  JSAC 2006»
13 years 5 months ago
Wormhole attacks in wireless networks
Abstract-- As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad hoc...
Yih-Chun Hu, Adrian Perrig, David B. Johnson
MONET
2007
194views more  MONET 2007»
13 years 4 months ago
Pervasive Healthcare and Wireless Health Monitoring
With an increasingly mobile society and the worldwide deployment of mobile and wireless networks, the wireless infrastructure can support many current and emerging healthcare appli...
Upkar Varshney
NOMS
2006
IEEE
129views Communications» more  NOMS 2006»
13 years 11 months ago
A Framework for the Decentralisation and Management of Collaborative Applications in Ubiquitous Computing Environments
—When deploying collaborative applications such as Instant Messaging in ubiquitous computing environments significant enhancements can be afforded by offering additional context ...
Karl Quinn, Austin Kenny, Kevin Feeney, David Lewi...
IDC
2009
Springer
13 years 3 months ago
Efficient Broadcasting by Selective Forwarding
A major challenge faced in mobile ad hoc networks (MANETs) is locating devices for communication, especially in the case of high node mobility and sparse node density. Present solu...
Doina Bein, Ajoy Kumar Datta, Balaji Ashok Sathyan...
SOCIALCOM
2010
13 years 3 months ago
GDC: Group Discovery Using Co-location Traces
Smart phones can collect and share Bluetooth co-location traces to identify ad hoc or semi-permanent social groups. This information, known to group members but otherwise unavailab...
Steve Mardenfeld, Daniel Boston, Susan Juan Pan, Q...