Sciweavers

182 search results - page 10 / 37
» Cryptographic techniques for mobile ad-hoc networks
Sort
View
MDM
2001
Springer
209views Communications» more  MDM 2001»
15 years 1 months ago
Energy-Efficient Transaction Management for Real-Time Mobile Databases in Ad-Hoc Network Environments
In an ad-hoc mobile network architecture, all the mobile hosts (MHs) are connected with each other through a wireless network that has a frequently changing topology. This type of ...
Le Gruenwald, Shankar M. Banik
WICON
2008
14 years 11 months ago
Towards distributed network classification for mobile ad hoc networks
Mobile ad hoc networks range from traditional MANETs where end-to-end paths exist from sources to destinations, to DTNs where no contemporaneous end-to-end paths exist and communi...
Dimitrios Antonellis, Ahmed Mansy, Konstantinos Ps...
AINA
2010
IEEE
15 years 2 months ago
Service Invocation over Content-Based Communication in Disconnected Mobile Ad Hoc Networks
—This paper presents a middleware platform for the provision of services in disconnected MANETs, focusing on service invocation. This middleware exploits content-based communicat...
Yves Mahéo, Romeo Said
WOWMOM
2005
ACM
135views Multimedia» more  WOWMOM 2005»
15 years 3 months ago
Stable, Congestion-Controlled Application-Layer Multicasting in Pedestrian Ad-Hoc Networks
Ad-hoc networks enable mobile devices to communicate without any fixed infrastructure. While reliable multicasting has been identified as a key application in this context, we a...
Peter Baumung
85
Voted
ICWN
2004
14 years 11 months ago
Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways
- Mobile ad hoc networks allow mobile nodes to communicate with one another without the aid of infrastructure thus forming temporary networks on the fly. While such networks are ga...
Shiv Mehra, Chansu Yu