Sciweavers

675 search results - page 100 / 135
» A Norm-Governed Systems Perspective of Ad Hoc Networks
Sort
View
DSN
2004
IEEE
15 years 5 months ago
Assured Reconfiguration of Embedded Real-Time Software
It is often the case that safety-critical systems have to be reconfigured during operation because of issues such as changes in the system's operating environment or the fail...
Elisabeth A. Strunk, John C. Knight
SAINT
2003
IEEE
15 years 7 months ago
Distributed Authentication for Peer-to-Peer Networks
A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Securi...
Shardul Gokhale, Partha Dasgupta
SECON
2007
IEEE
15 years 8 months ago
Privacy Preserving Communication in MANETs
Abstract— Mobile ad hoc networks often support sensitive applications. These applications may require that users’ identity, location, and correspondents be kept secret. This is...
Heesook Choi, Patrick Drew McDaniel, Thomas F. La ...
HICSS
2003
IEEE
148views Biometrics» more  HICSS 2003»
15 years 7 months ago
Bluenet II - A Detailed Realization of the Algorithm and Performance
The recent interest in ad hoc networks, in general, and in the Bluetooth technology, in particular, has stimulated much research in algorithms for topology control of such network...
Zhifang Wang, Zygmunt J. Haas, Robert J. Thomas
WCNC
2010
IEEE
15 years 5 months ago
MAC Performance Analysis for Vehicle-to-Infrastructure Communication
—The newly emerged vehicular ad hoc network adopts the contention based IEEE 802.11 DCF as its MAC. While it has been extensively studied in the stationary indoor environment (e....
Tom H. Luan, Xinhua Ling, Xuemin Shen