Sciweavers

1348 search results - page 261 / 270
» Group monitoring in mobile wireless sensor networks
Sort
View
MSWIM
2005
ACM
15 years 3 months ago
Fast pre-authentication based on proactive key distribution for 802.11 infrastructure networks
Recently, user mobility in wireless data networks is increasing because of the popularity of portable devices and the desire for voice and multimedia applications. These applicati...
Mohamed Kassab, Abdelfattah Belghith, Jean-Marie B...
WOWMOM
2009
ACM
164views Multimedia» more  WOWMOM 2009»
15 years 3 months ago
Selecting vertical handover candidates in IEEE 802.11 mesh networks
The IEEE 802.11 working group currently integrates the option of mesh networking into its standard for WLANs. In addition to WLAN meshes, future wireless networks will be expanded...
Sven Wiethölter, Adam Wolisz
EJWCN
2011
133views more  EJWCN 2011»
14 years 4 months ago
CARNIVORE: A Disruption-Tolerant System for Studying Wildlife
—This paper presents CARNIVORE, a system for in-situ, yet unobtrusive monitoring of cryptic, difficult-tocatch/observe wildlife in their natural habitat. CARNIVORE consists of a...
Matthew Rutishauser, Vladislav Petkov, Jay Boice, ...
ADHOC
2008
88views more  ADHOC 2008»
14 years 9 months ago
Safari: A self-organizing, hierarchical architecture for scalable ad hoc networking
As wireless devices become more pervasive, mobile ad hoc networks are gaining importance, motivating the development of highly scalable ad hoc networking techniques. In this paper...
Shu Du, Ahamed Khan, Santashil PalChaudhuri, Ansle...
PERCOM
2006
ACM
15 years 9 months ago
Managing Pervasive Systems using Role-based Obligation Policies
Pervasive systems are complex distributed systems containing heterogeneous and mobile devices, services and applications. Policy-based management is an effective approach for mana...
Chetan Shiva Shankar, Roy H. Campbell