Sciweavers

29 search results - page 6 / 6
» Prioritized Overlay Multicast in Mobile Ad Hoc Environments
Sort
View
IJNSEC
2008
152views more  IJNSEC 2008»
13 years 5 months ago
Group Key Management in MANETs
Specific applications like military or public emergency ones require secure group communication in ad hoc environments. The most suitable solution to provide the expected level of...
Mohamed Salah Bouassida, Isabelle Chrisment, Olivi...
ADHOC
2007
104views more  ADHOC 2007»
13 years 5 months ago
An overlay approach to data security in ad-hoc networks
While it has been argued that application-layer overlay protocols can enhance services in mobile ad-hoc networks, hardly any empirical data is available on the throughput and dela...
Jörg Liebeherr, Guangyu Dong
MIDDLEWARE
2004
Springer
13 years 11 months ago
Kernel-middleware interaction to support adaptation in pervasive computing environments
In pervasive computing environments, conditions are highly variable and resources are limited. In order to meet the needs of applications, systems must adapt dynamically to changi...
Farshad A. Samimi, Philip K. McKinley, Seyed Masou...
GLOBECOM
2006
IEEE
13 years 12 months ago
Optimal Resource Allocation for Homogeneous Wireless Multicast
— Multicast-based data communication is an efficient communication scheme especially in multihop ad hoc networks where the MAC layer is based on one-hop broadcast from one sourc...
Amr M. Mohamed, Hussein M. Alnuweiri