Sciweavers

359 search results - page 67 / 72
» Key Management for Heterogeneous Ad Hoc Wireless Networks
Sort
View
COLCOM
2009
IEEE
15 years 2 months ago
Unified analytical models for Location Management costs and optimum design of location areas
—Within collaborative computing, computer mediated communications are evolving rapidly thanks to the development of new technologies. The facilitation of awareness and discovery ...
Eladio Martin, Ling Liu, Matt Weber, Péter ...
IEICET
2008
136views more  IEICET 2008»
14 years 9 months ago
Delay Analysis of Car-to-Car Reliable Data Delivery Strategies Based on Data Mulling with Network Coding
Abstract--Vehicular ad hoc networks (VANET) aims to enhance vehicle navigation safety by providing an early warning system: any chance of accidents is informed through the wireless...
Joon-Sang Park, Uichin Lee, Soon-Young Oh, Mario G...
ADHOC
2007
104views more  ADHOC 2007»
14 years 9 months ago
An overlay approach to data security in ad-hoc networks
While it has been argued that application-layer overlay protocols can enhance services in mobile ad-hoc networks, hardly any empirical data is available on the throughput and dela...
Jörg Liebeherr, Guangyu Dong
71
Voted
PERCOM
2005
ACM
15 years 9 months ago
Re-Conceptualizing Learning Environments: A Framework for Pervasive eLearning
Pervasive eLearning requires a novel media perspective on learning objects. Instead of viewing handhelds or smart phones as minimized PCs we would like to propose a perspective on...
Reinhard Keil-Slawik, Thorsten Hampel, Bernd E&szl...
DEXAW
2007
IEEE
199views Database» more  DEXAW 2007»
15 years 1 months ago
Dealing with Sporadic Strangers, or the (Un)Suitability of Trust for Mobile P2P Security
A number of factors, such as the increasing popularity of wireless networks, the opportunities offered by 3G services, and the rapid proliferation of mobile devices, have stimulat...
Esther Palomar, Juan M. Estévez-Tapiador, J...