Sciweavers

ICWN
2004
13 years 5 months ago
Suitability of Existing Service Discovery Protocols for Mobile Users in an Ambient Intelligence Environment
Abstract-- Service discovery enables users to access information, resources and services anytime, anywhere. This involves a client, a service provider and an infrastructure for ser...
Davy Preuveneers, Yolande Berbers
ICWN
2004
13 years 5 months ago
Does Cluster Architecture Enhance Performance Scalability of Clustered Mobile Ad Hoc Networks?
This paper explains and evaluates the performance of a cluster architecture-based routing protocol, called Link Cluster Protocol (LCP), in mobile ad hoc networks (MANETs). LCP show...
Myeong L. Lim, Chansu Yu
ICWN
2004
13 years 5 months ago
Congestion Control in a High Speed Radio Environment
This paper explores interactions between congestion control mechanisms at the transport layer and scheduling algorithms at the physical layer in the High-Speed Down-link Packet Acc...
Sara Landström, Lars-Åke Larzon, Ulf Bo...
ICWN
2004
13 years 5 months ago
Demand-Driven Clustering in MANETs
Abstract-- Many clustering protocols for mobile ad hoc networks (MANETs) have been proposed in the literature. With only one exception so far [1], all these protocols are proactive...
Curt Cramer, Oliver Stanze, Kilian Weniger, Martin...
ICWN
2004
13 years 5 months ago
Improvements to Location-Aided Routing Through Directional Count Restrictions
We present an effective way to improve the quality of unicast routes determined by the LAR Box method. Our method uses the location information acquired by LAR itself to determine ...
Michael Colagrosso, Nathan Enochs, Tracy Camp
ICWN
2004
13 years 5 months ago
QoS Support in Wireless Sensor Networks: A Survey
In this paper, we assess the state of the art of Quality of Services (QoS) support in wireless sensor networks (WSNs). Unlike traditional end-to-end multimedia applications, many n...
Dazhi Chen, Pramod K. Varshney
ICWN
2004
13 years 5 months ago
Securing Data Transmissions and Retransmissions Management in Ad Hoc Networks
We present in this paper a solution exploiting existence of multiple paths between nodes to secure data in Ad hoc networks. This solution is also designed in the aim to give the ne...
Souheila Bouam, Jalel Ben-Othman
ICWN
2004
13 years 5 months ago
Searching in Variably Connected P2P Networks
Peer-to-Peer networks are gaining popularity through file-sharing communities. Most P2P networks demand a certain stability from it's nodes in order to function satisfactory. ...
Njål T. Borch, Lars Kristian Vognild