Sciweavers

119 search results - page 19 / 24
» A Flexible Resource Location Protocol for Peer-to-Peer Netwo...
Sort
View
JSAC
2008
199views more  JSAC 2008»
14 years 11 months ago
Defense against Primary User Emulation Attacks in Cognitive Radio Networks
Cognitive Radio (CR) is a promising technology that can alleviate the spectrum shortage problem by enabling unlicensed users equipped with CRs to coexist with incumbent users in li...
Ruiliang Chen, Jung Min Park, Jeffrey H. Reed
96
Voted
ICDCSW
2003
IEEE
15 years 5 months ago
Service Discovery and Name Resolution Architectures for On-Demand MANETs
Discovery of services and other named resources is expected to be a crucial feature for the usability of mobile ad-hoc networks (MANETs). In this paper, we propose a mechanism for...
Paal Engelstad, Yan Zheng, Tore E. Jønvik, ...
SASN
2006
ACM
15 years 5 months ago
Location-aware key predistribution scheme for wide area wireless sensor networks
Key predistribution in wireless sensor networks refers to the problem of distributing secret keys among sensors prior to deployment. Solutions appeared in the literature can be cl...
Katerina Simonova, Alan C. H. Ling, Xiaoyang Sean ...

Publication
279views
16 years 9 months ago
Potential Networking Applications of Global Positioning Systems (GPS)
Global Positioning System (GPS) Technology allows precise determination of location, velocity, direction, and time. The price of GPS receivers is falling rapidly and the applicatio...
G. Dommety and Raj Jain
ADHOCNOW
2008
Springer
15 years 6 months ago
Adapting BitTorrent to Wireless Ad Hoc Networks
Abstract. BitTorrent is one of the Internet’s most efficient content distribution protocols. It is known to perform very well over the wired Internet where end-to-end performance...
Mohamed Karim Sbai, Chadi Barakat, Jaeyoung Choi, ...