Sciweavers

1316 search results - page 141 / 264
» JMS on Mobile Ad Hoc Networks
Sort
View
MOBIHOC
2005
ACM
15 years 9 months ago
A secure ad-hoc routing approach using localized self-healing communities
Mobile ad hoc networks (MANETs) are vulnerable to routing attacks, especially attacks launched by non-cooperative (selfish or compromised) network members and appear to be protoco...
Jiejun Kong, Xiaoyan Hong, Yunjung Yi, Joon-Sang P...
WOWMOM
2005
ACM
135views Multimedia» more  WOWMOM 2005»
15 years 3 months ago
Stable, Congestion-Controlled Application-Layer Multicasting in Pedestrian Ad-Hoc Networks
Ad-hoc networks enable mobile devices to communicate without any fixed infrastructure. While reliable multicasting has been identified as a key application in this context, we a...
Peter Baumung
JSAC
2011
184views more  JSAC 2011»
14 years 5 months ago
Goodput Enhancement of VANETs in Noisy CSMA/CA Channels
— The growing interest in vehicular ad hoc networks (VANETs) enables decentralized traveler information systems to become more feasible and effective in Intelligent Transportatio...
Yusun Chang, Christopher P. Lee, John A. Copeland
NETWORKING
2004
14 years 11 months ago
A-STAR: A Mobile Ad Hoc Routing Strategy for Metropolis Vehicular Communications
Abstract. One of the major issues that affect the performance of Mobile Ad hoc NETworks (MANET) is routing. Recently, position-based routing for MANET is found to be a very promisi...
Boon-Chong Seet, Genping Liu, Bu-Sung Lee, Chuan H...
IJWIN
2006
119views more  IJWIN 2006»
14 years 10 months ago
Querying in Packs: Trustworthy Data Management in Ad Hoc Networks
We describe a trust-based data management framework enabling mobile devices to access the distributed computation, storage, and sensory resources available in pervasive computing ...
Anand Patwardhan, Filip Perich, Anupam Joshi, Tim ...