Sciweavers

547 search results - page 97 / 110
» Analysis of a mobile communication security protocol
Sort
View
INFOCOM
2010
IEEE
14 years 8 months ago
Recognizing Exponential Inter-Contact Time in VANETs
—Inter-contact time between moving vehicles is one of the key metrics in vehicular ad hoc networks (VANETs) and central to forwarding algorithms and the end-to-end delay. Due to ...
Hongzi Zhu, Luoyi Fu, Guangtao Xue, Yanmin Zhu, Mi...
FC
2005
Springer
142views Cryptology» more  FC 2005»
15 years 3 months ago
Testing Disjointness of Private Datasets
Two parties, say Alice and Bob, possess two sets of elements that belong to a universe of possible values and wish to test whether these sets are disjoint or not. In this paper we ...
Aggelos Kiayias, Antonina Mitrofanova
INFOCOM
2003
IEEE
15 years 2 months ago
Optimizing Route-Cache Lifetime in Ad Hoc Networks
—On-demand routing reduces the control overhead in mobile ad hoc networks, but it has the major drawback of introducing latency between route-request arrival and the determinatio...
Ben Liang, Zygmunt J. Haas
IFIP
2004
Springer
15 years 2 months ago
High Throughput Route Selection in Multi-rate Ad Hoc Wireless Networks
Abstract— An ad hoc wireless network is an autonomous selforganizing system of mobile nodes connected by wireless links where nodes not in direct range communicate via intermedia...
Baruch Awerbuch, David Holmer, Herbert Rubens
RAS
2007
169views more  RAS 2007»
14 years 9 months ago
Decentralized cooperative control of heterogeneous vehicle groups
We coordinate in discrete time the interaction of two heterogeneous groups of mobile agents: a group of ground vehicles (ugvs) and a group of aerial vehicles (uavs). The ground ag...
Herbert G. Tanner, D. K. Christodoulakis