Sciweavers

644 search results - page 77 / 129
» Adaptive security protocol selection for mobile computing
Sort
View
WS
2005
ACM
15 years 5 months ago
Fully self-organized peer-to-peer key management for mobile ad hoc networks
Mobile ad hoc networks (MANETs) offer communication over a shared wireless channel without any pre-existing infrastructure. Forming peer-to-peer security associations in MANETs i...
Johann van der Merwe, Dawoud S. Dawoud, Stephen Mc...
WCE
2007
15 years 1 months ago
A Brief Survey on RFID Privacy and Security
Abstract— In this survey we take a look at different approaches proposed in the literature for addressing the privacy and security issues derived from the Radio-Frequency IDenti...
J. Aragones-Vilella, Antoni Martínez-Balles...
ISCC
2000
IEEE
119views Communications» more  ISCC 2000»
15 years 4 months ago
Energy-Efficient Adaptive Wireless Network Design
Energy efficiency is an important issue for mobile computers since they must rely on their batteries. We present an energyefficient highly adaptive architecture of a network inter...
Paul J. M. Havinga, Gerard J. M. Smit, Martinus Bo...
SAC
2006
ACM
15 years 5 months ago
A chat interface for human-agent interaction in MAST
In this paper we introduce a group-messaging interface that allows humans to efficiently interact with a group of agents through a hierarchical and customizable text protocol. Our...
Marco M. Carvalho, Matteo Rebeschini, James Horsle...
PE
2006
Springer
158views Optimization» more  PE 2006»
14 years 11 months ago
Performance evaluation of multiple-rate mobile ad hoc networks
Existing wireless networks usually provide multiple data transmission rates. This paper presents a simulation study on the performance of multiple-rate mobile ad hoc networks (MAN...
Gang Ding, Xiaoxin Wu, Bharat K. Bhargava