Sciweavers

478 search results - page 94 / 96
» Forward-Secure Key Evolution in Wireless Sensor Networks
Sort
View
PERCOM
2005
ACM
15 years 9 months ago
Policy-Driven Data Dissemination for Context-Aware Applications
Context-aware pervasive-computing applications require continuous monitoring of their physical and computational environment to make appropriate adaptation decisions in time. The ...
Guanling Chen, David Kotz
GECCO
2008
Springer
146views Optimization» more  GECCO 2008»
14 years 10 months ago
A formal performance modeling framework for bio-inspired ad hoc routing protocols
Bio-inspired ad hoc routing is an active area of research. The designers of these algorithms predominantly evaluate the performance of their protocols with the help of simulation ...
Muhammad Saleem, Syed Ali Khayam, Muddassar Farooq
MOBICOM
2005
ACM
15 years 3 months ago
VITP: an information transfer protocol for vehicular computing
Recent advances in wireless inter-vehicle communication systems enable the development of Vehicular Ad-Hoc Networks (VANET) and create significant opportunities for the deploymen...
Marios D. Dikaiakos, Saif Iqbal, Tamer Nadeem, Liv...
ENTCS
2007
158views more  ENTCS 2007»
14 years 9 months ago
Abstraction and Completeness for Real-Time Maude
ion and Completeness for Real-Time Maude Peter Csaba ¨Olveczky a,b and Jos´e Meseguer b a Department of Informatics, University of Oslo b Department of Computer Science, Universi...
Peter Csaba Ölveczky, José Meseguer
MOBICOM
2004
ACM
15 years 3 months ago
Broadcast reception rates and effects of priority access in 802.11-based vehicular ad-hoc networks
One key usage of VANET is to support vehicle safety applications. This use case is characterized by the prominence of broadcasts in scaled settings. In this context, we try to ans...
Marc Torrent-Moreno, Daniel Jiang, Hannes Hartenst...