Sciweavers

198 search results - page 40 / 40
» Mobile Agents for Locating Documents in Ad Hoc Networks
Sort
View
MOBICOM
2004
ACM
13 years 10 months ago
Revisiting the TTL-based controlled flooding search: optimality and randomization
In this paper we consider the problem of searching for a node or an object (i.e., piece of data, file, etc.) in a large network. Applications of this problem include searching fo...
Nicholas B. Chang, Mingyan Liu
PERCOM
2010
ACM
13 years 3 months ago
HERO: Hybrid Emergency Route-Opening Protocol
—This paper presents an ad-hoc vehicular protocol to support the logistics of first responders. First responders often travel several kilometers to reach an area impacted by an ...
Jonathan Woodbridge, Mars Lan, Giovanni Pau, Mario...
TMC
2010
158views more  TMC 2010»
13 years 3 months ago
Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes
—Secure distance-based localization in the presence of cheating beacon (or anchor) nodes is an important problem in mobile wireless ad hoc and sensor networks. Despite significa...
Murtuza Jadliwala, Sheng Zhong, Shambhu J. Upadhya...