Sciweavers

1316 search results - page 2 / 264
» JMS on Mobile Ad Hoc Networks
Sort
View
PERCOM
2004
ACM
14 years 5 months ago
Peer-to-peer File-sharing over Mobile Ad hoc Networks
Current peer-to-peer file-sharing systems mostly work on wired networks. Mobile ad hoc network is characterized as multi-hop wireless communications between mobile devices. In thi...
Gang Ding, Bharat K. Bhargava
TON
2002
189views more  TON 2002»
13 years 5 months ago
Mobility increases the capacity of ad hoc wireless networks
Abstract--The capacity of ad hoc wireless networks is constrained by the mutual interference of concurrent transmissions between nodes. We study a model of an ad hoc network where ...
Matthias Grossglauser, David N. C. Tse
FUIN
2010
163views more  FUIN 2010»
13 years 2 months ago
Equational Reasoning on Mobile Ad Hoc Networks
We provide an equational theory for Restricted Broadcast Process Theory to reason about ad hoc networks. We exploit an extended algebra called Computed Network Theory to axiomatize...
Fatemeh Ghassemi, Wan Fokkink, Ali Movaghar
WMCSA
2003
IEEE
13 years 10 months ago
Design and Evaluation of a Metropolitan Area Multitier Wireless Ad Hoc Network Architecture
Few real-world applications of mobile ad hoc networks have been developed or deployed outside the military environment, and no traces of actual node movement in a real ad hoc netw...
Jorjeta G. Jetcheva, Yih-Chun Hu, Santashil PalCha...
ICWN
2009
13 years 3 months ago
Threshold Secret Sharing Authentication Scheme in Noisy Mobile Ad Hoc Networks
- This paper presents a description and performance evaluation of a threshold secret sharing (TSS) authentication scheme for selfsecuring mobile ad hoc networks (MANETs) suffering ...
Shakir Hussain, Hussein Al-Bahadili, Ghassan Issa,...