Sciweavers

1536 search results - page 41 / 308
» Flexible simulation of distributed protocols for mobile comp...
Sort
View
CORR
2010
Springer
432views Education» more  CORR 2010»
14 years 9 months ago
A Distributed Trust Management Framework for Detecting Malicious Packet Dropping Nodes in a Mobile Ad Hoc Network
In a multi-hop mobile ad hoc network (MANET) mobile nodes communicate with each other forming a cooperative radio network. Security remains a major challenge for these networks du...
Jaydip Sen
LCN
2003
IEEE
15 years 3 months ago
Performance Analysis of IP Paging Protocol in IEEE 802.11 Networks
Recently, IEEE 802.11 wireless networks have been widely deployed in public areas for mobile Internet services. In the public wireless LAN systems, paging function is necessary to...
Sangheon Pack, Ved Kafle, Yanghee Choi
IJAHUC
2010
245views more  IJAHUC 2010»
14 years 8 months ago
Cross-layer Mobile Chord P2P protocol design for VANET
Abstract: Efficient content distribution is one of the emerging applications in vehicular networks. To provide scalable content distribution in vehicular networks, Chord peer-to-pe...
Che-Liang Liu, Chih-Yu Wang, Hung-Yu Wei
STOC
1994
ACM
134views Algorithms» more  STOC 1994»
15 years 1 months ago
A coding theorem for distributed computation
Shannon's Coding Theorem shows that in order to reliably transmit a message of T bits over a noisy communication channel, only a constant slowdown factor is necessary in the ...
Sridhar Rajagopalan, Leonard J. Schulman
SAC
2002
ACM
14 years 9 months ago
Proxy-based security protocols in networked mobile devices
We describe a resource discovery and communication system designed for security and privacy. All objects in the system, e.g., appliances, wearable gadgets, software agents, and us...
Matt Burnside, Dwaine E. Clarke, Todd Mills, Andre...