Sciweavers

182 search results - page 18 / 37
» Cryptographic techniques for mobile ad-hoc networks
Sort
View
MIDDLEWARE
2004
Springer
15 years 5 months ago
A context-aware middleware for applications in mobile Ad Hoc environments
Novel ubiquitous computing applications such as intelligent vehicles, smart buildings, and traffic management require special properties that traditional computing applications d...
Carl-Fredrik Sørensen, Maomao Wu, Thirunavu...
ISMIR
2005
Springer
156views Music» more  ISMIR 2005»
15 years 5 months ago
Content-Based Music Information Retrieval in Wireless Ad-Hoc Networks
This paper, introduces the application of Content-Based Music Information Retrieval (CBMIR) in wireless ad-hoc networks. We investigate for the first time the challenges posed by...
Ioannis Karydis, Alexandros Nanopoulos, Apostolos ...
SASN
2004
ACM
15 years 5 months ago
Securing quality-of-service route discovery in on-demand routing for ad hoc networks
An ad hoc network is a collection of computers (nodes) that cooperate to forward packets for each other over a multihop wireless network. Users of such networks may wish to use de...
Yih-Chun Hu, David B. Johnson
102
Voted
ACSAC
2004
IEEE
15 years 4 months ago
An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks
Mobile ad hoc network routing protocols are highly susceptible to subversion. Previous research in securing these protocols has typically used techniques based on encryption and r...
Giovanni Vigna, Sumit Gwalani, Kavitha Srinivasan,...
SIGCOMM
2012
ACM
13 years 2 months ago
Revealing contact interval patterns in large scale urban vehicular ad hoc networks
Contact interval between moving vehicles is one of the key metrics in vehicular ad hoc networks (VANETs), which is important to routing schemes and network capacity. In this work,...
Yong Li, Depeng Jin, Pan Hui, Li Su, Lieguang Zeng