Sciweavers

1677 search results - page 231 / 336
» A distributed security scheme for ad hoc networks
Sort
View
BIOWIRE
2007
Springer
15 years 4 months ago
Epcast: Controlled Dissemination in Human-Based Wireless Networks Using Epidemic Spreading Models
Epidemics-inspired techniques have received huge attention in recent years from the distributed systems and networking communities. These algorithms and protocols rely on probabili...
Salvatore Scellato, Cecilia Mascolo, Mirco Musoles...
EURONGI
2008
Springer
14 years 12 months ago
Connectivity Gateway Discovery in MANETs
Abstract. The integration of mobile ad hoc networks into IP-based access networks demands the presence of a gateway which is responsible for propagating some configuration paramete...
Antonio J. Yuste, Alicia Triviño-Cabrera, F...
DMSN
2008
ACM
14 years 12 months ago
A substrate for in-network sensor data integration
With the ultimate goal of extending the data integration paradigm and query processing capabilities to ad hoc wireless networks, sensors, and stream systems, we consider how to su...
Svilen R. Mihaylov, Marie Jacob, Zachary G. Ives, ...
INFOCOM
2002
IEEE
15 years 3 months ago
Performance of Reliable Transport Protocol over IEEE 802.11 Wireless LAN: Analysis and Enhancement
IEEE 802.11 Medium Access Control(MAC) is proposed to support asynchronous and time bounded delivery of radio data packets in infrastructure and ad hoc networks. The basis of the I...
Haitao Wu, Yong Peng, Keping Long, Shiduan Cheng, ...
PPL
2008
94views more  PPL 2008»
14 years 10 months ago
Self-Stabilizing Graph Protocols
We provide self-stabilizing algorithms to obtain and maintain a maximal matching, maximal independent set or minimal dominating set in a given system graph. They converge in linea...
Wayne Goddard, Stephen T. Hedetniemi, David Pokras...