Sciweavers

675 search results - page 119 / 135
» Ad Hoc Network Authentication: A Jini-Based Approach
Sort
View
MOBIHOC
2001
ACM
15 years 9 months ago
Localized algorithms in wireless ad-hoc networks: location discovery and sensor exposure
The development of practical, localized algorithms is probably the most needed and most challenging task in wireless ad-hoc sensor networks (WASNs). Localized algorithms are a spe...
Seapahn Meguerdichian, Sasha Slijepcevic, Vahag Ka...
CONEXT
2006
ACM
15 years 3 months ago
Proposition of a cross-layer architecture model for the support of QoS in ad-hoc networks
Due to the lack of built-in quality of service support, IEEE 802.11 ad-hoc networks presents serious defies in meeting the demands of multimedia applications. To overcome such ch...
Wafa Berrayana, Habib Youssef, Stéphane Loh...
JSAC
2010
131views more  JSAC 2010»
14 years 8 months ago
Joint synchronization and localization using TOAs: A linearization based WLS solution
—Joint synchronization and localization using time of arrival (TOA) measurements is a very important research topic for many wireless ad hoc sensor network applications. For such...
Shouhong Zhu, Zhiguo Ding
COMCOM
2008
153views more  COMCOM 2008»
14 years 9 months ago
A TTP-free protocol for location privacy in location-based services
Location-based services (LBS) will be a keystone of the new information society that is founded on the information and communications technologies (ICTs). Mobile devices such as c...
Agusti Solanas, Antoni Martínez-Ballest&eac...
SIGOPSE
2004
ACM
15 years 2 months ago
Generic role assignment for wireless sensor networks
Wireless ad hoc networks of sensor nodes are envisioned to be deployed in the physical environment to monitor a wide variety of real-world phenomena. Almost any sensor network appl...
Kay Römer, Christian Frank, Pedro José...