Sciweavers

675 search results - page 118 / 135
» Ad Hoc Network Authentication: A Jini-Based Approach
Sort
View
GLOBECOM
2006
IEEE
15 years 3 months ago
Integrated Scheduling of Application- and Network-Layer Tasks in Delay-Tolerant MANETs
Abstract— Natural or man-made disasters can partition networks while threatening human lives. Because conventional Mobile Ad-Hoc Networks (MANETs) cannot route messages across pa...
José Carlos Brustoloni, Sherif M. Khattab, ...
JSAC
2011
253views more  JSAC 2011»
14 years 4 months ago
Control Channel Establishment in Cognitive Radio Networks using Channel Hopping
Abstract—In decentralized cognitive radio (CR) networks, enabling the radios to establish a control channel (i.e., “rendezvous” to establish a link) is a challenging problem....
Kaigui Bian, Jung Min Park, Ruiliang Chen
ICDCSW
2006
IEEE
15 years 3 months ago
Contory: A Smart Phone Middleware Supporting Multiple Context Provisioning Strategies
This paper presents Contory, a middleware specifically deployed to support provisioning of context information on mobile devices such as smart phones. Contory integrates multiple...
Oriana Riva, Cristiano di Flora
DSN
2004
IEEE
15 years 1 months ago
Assured Reconfiguration of Embedded Real-Time Software
It is often the case that safety-critical systems have to be reconfigured during operation because of issues such as changes in the system's operating environment or the fail...
Elisabeth A. Strunk, John C. Knight
ECEASST
2008
83views more  ECEASST 2008»
14 years 9 months ago
Layered Architecture Consistency for MANETs: Introducing New Team Members
In this paper we extend our results (as given in [PHE+07]) concerning the layered architecture for modeling workflows in Mobile Ad-Hoc NETworks (MANETs) using algebraic higher ord...
Enrico Biermann, Kathrin Hoffmann, Julia Padberg