Sciweavers

NETWORK
2008
96views more  NETWORK 2008»
13 years 4 months ago
Enabling rapid wireless system composition through layer-2 discovery
Although small mobile computers have processors whose capabilities are increasing, often they still are resource constrained in terms of performing many common computing tasks. Co...
Shivani Sud, Roy Want, Trevor Pering, Barbara Rosa...
IJHPCN
2006
114views more  IJHPCN 2006»
13 years 4 months ago
Improved schemes for power-efficient broadcast in ad hoc networks
: Ad hoc wireless networks are a special type of wireless network in which a collection of mobile hosts (nodes) with wireless network interfaces may form a temporary network withou...
Xiao Chen, Jian Shen
ADHOC
2006
87views more  ADHOC 2006»
13 years 4 months ago
Medium Access Control protocols for ad hoc wireless networks: A survey
Studies of ad hoc wireless networks are a relatively new field gaining more popularity for various new applications. In these networks, the Medium Access Control (MAC) protocols a...
Sunil Kumar, Vineet S. Raghavan, Jing Deng
CORR
2008
Springer
98views Education» more  CORR 2008»
13 years 4 months ago
Void Traversal for Guaranteed Delivery in Geometric Routing
Geometric routing algorithms like GFG (GPSR) are lightweight, scalable algorithms that can be used to route in resource-constrained ad hoc wireless networks. However, such algorith...
Mikhail Nesterenko, Adnan Vora
COMCOM
2008
153views more  COMCOM 2008»
13 years 4 months ago
A TTP-free protocol for location privacy in location-based services
Location-based services (LBS) will be a keystone of the new information society that is founded on the information and communications technologies (ICTs). Mobile devices such as c...
Agusti Solanas, Antoni Martínez-Ballest&eac...
NETWORKING
2000
13 years 5 months ago
Survivability Analysis of Ad Hoc Wireless Network Architecture
Mobile ad hoc wireless networks are generating novel interests in mobile computing. The dynamism in network topology has thrown up multifarious issues, requiring a fresh look into ...
Krishna Paul, Romit Roy Choudhury, Somprakash Band...
ICWN
2004
13 years 6 months ago
An Architecture Supporting Run-Time Upgrade of Proxy-Based Services in Ad Hoc Networks
Abstract-- In the proxy approach to Service Oriented Computing, a service advertises a proxy, which is searched for, retrieved and used by interested clients as a local handle to t...
Rohan Sen, Radu Handorean, Gregory Hackmann, Gruia...
DMSN
2008
ACM
13 years 6 months ago
A substrate for in-network sensor data integration
With the ultimate goal of extending the data integration paradigm and query processing capabilities to ad hoc wireless networks, sensors, and stream systems, we consider how to su...
Svilen R. Mihaylov, Marie Jacob, Zachary G. Ives, ...
BROADNETS
2006
IEEE
13 years 6 months ago
On the Broadcast Storm Problem in Ad hoc Wireless Networks
Routing protocols developed for ad hoc wireless networks use broadcast transmission to either discover a route or disseminate information. More specifically, reactive routing proto...
Ozan K. Tonguz, Nawaporn Wisitpongphan, Jayendra S...
DIALM
1999
ACM
98views Algorithms» more  DIALM 1999»
13 years 8 months ago
Routing with guaranteed delivery in ad hoc wireless networks
We consider routing problems in ad hoc wireless networks modeled as unit graphs in which nodes are points in the plane and two nodes can communicate if the distance between them is...
Prosenjit Bose, Pat Morin, Ivan Stojmenovic, Jorge...