Abstract— Mobile ad hoc networks often support sensitive applications. These applications may require that users’ identity, location, and correspondents be kept secret. This is...
Heesook Choi, Patrick Drew McDaniel, Thomas F. La ...
In this paper, we propose a novel ReliAble ProbabIlistic Dissemination protocol, RAPID, for mobile wireless ad-hoc networks that tolerates message omissions, node crashes, and sel...
Vadim Drabkin, Roy Friedman, Gabriel Kliot, Marc S...
Sensors that operate in an unattended, harsh or hostile environment are vulnerable to compromises because their low costs preclude the use of expensive tamper-resistant hardware. ...
Application designers of collaborative distributed Virtual Environments must account for the influence of the network connection and its detrimental effects on user performance. ...
Alexey Tumanov, Robert S. Allison, Wolfgang St&uum...
—Broadband packet data services are demanded in the next generation mobile communications systems. Multi-carrier CDMA (MC-CDMA) is considered to be a promising wireless technique...