Sciweavers

1677 search results - page 222 / 336
» A distributed security scheme for ad hoc networks
Sort
View
PERCOM
2009
ACM
15 years 5 months ago
Distributed Policy Resolution Through Negotiation in Ubiquitous Computing Environments
—Ensuring spontaneous ad hoc interoperation in decentralized ubiquitous computing environments is challenging, because of heterogeneous resources and divergent policies. Centrali...
Venkatraman Ramakrishna, Peter L. Reiher, Leonard ...
INFOCOM
2009
IEEE
15 years 4 months ago
Exact Analysis of Latency of Stateless Opportunistic Forwarding
Abstract—Stateless opportunistic forwarding is a simple faulttolerant distributed approach for data delivery and information querying in wireless ad hoc networks, where packets a...
Chi-Kin Chau, Prithwish Basu
SASN
2003
ACM
15 years 3 months ago
SECTOR: secure tracking of node encounters in multi-hop wireless networks
In this paper we present SECTOR, a set of mechanisms for the secure verification of the time of encounters between nodes in multi-hop wireless networks. This information can be u...
Srdjan Capkun, Levente Buttyán, Jean-Pierre...
JSAC
2007
115views more  JSAC 2007»
14 years 10 months ago
Energy aware power allocation strategies for multihop-cooperative transmission schemes
Abstract— This paper deals with a cooperative decoded relaying scheme in multihop wireless network and the corresponding transmitters power allocation strategies for nodes belong...
Stefano Savazzi, Umberto Spagnolini
MOBIHOC
2001
ACM
15 years 9 months ago
Performance of a new Bluetooth scatternet formation protocol
A Bluetooth ad hoc network can be formed by interconnecting piconets into scatternets. The constraints and properties of Bluetooth scatternets present special challenges in formin...
Ching Law, Amar K. Mehta, Kai-Yeung Siu