Sciweavers

182 search results - page 19 / 37
» Cryptographic techniques for mobile ad-hoc networks
Sort
View
133
Voted
ADHOCNOW
2007
Springer
15 years 6 months ago
Dependable and Secure Distributed Storage System for Ad Hoc Networks
The increased use of ubiquitous computing devices is resulting in networks that are highly mobile, well connected and growing in processing and storage capabilities. The nature of ...
Rudi Ball, James Grant, Jonathan So, Victoria Spur...
PERCOM
2004
ACM
15 years 12 months ago
Virtual Paths Routing: A Highly Dynamic Routing Protocol for Ad Hoc Wireless Networks
In this paper, we introduce the Virtual Paths Routing (VPR) Protocol for ad hoc wireless networks. VPR provides highly dynamic, correct, and efficient paths creation and maintenan...
Abdulrahman H. Altalhi, Golden G. Richard III
115
Voted
IJHPCN
2006
151views more  IJHPCN 2006»
15 years 10 days ago
Adaptive local searching and caching strategies for on-demand routing protocols in ad hoc networks
: On-demand routing protocols are widely used in mobile ad hoc networks due to their capability of adjusting to frequent network topology changes within acceptable routing overhead...
Zhao Cheng, Wendi B. Heinzelman
ICNP
2006
IEEE
15 years 6 months ago
Benefit-based Data Caching in Ad Hoc Networks
—Data caching can significantly improve the efficiency of information access in a wireless ad hoc network by reducing the access latency and bandwidth usage. However, designing e...
Bin Tang, Himanshu Gupta, Samir R. Das
110
Voted
ICC
2007
IEEE
132views Communications» more  ICC 2007»
15 years 6 months ago
Topology Reconstruction and Characterisation of Wireless Ad Hoc Networks
Abstract— Wireless ad hoc networks provide a useful communications infrastructure for the mobile battlefield. In this paper we apply and develop passive radio frequency signal s...
Jon Arnold, Nigel Bean, Miro Kraetzl, Matthew Roug...