Sciweavers

1434 search results - page 153 / 287
» Mobile ad hoc collaboration
Sort
View
ADT
2008
15 years 1 months ago
Evaluating voice traffic requirements on IEEE 802.11 ad hoc networks
This paper analyzes voice transmission capacity on IEEE 802.11 ad hoc networks by performing simulations related to delay, jitter, loss rate, and consecutive losses. We evaluate th...
Pedro B. Velloso, Marcelo G. Rubinstein, Otto Carl...
147
Voted
CIIT
2004
141views Communications» more  CIIT 2004»
15 years 3 months ago
Dilemma of using high datarate in IEEE 802.11B based multihop ad hoc networks
Due to the fact that high datarate has shorter transmission range, the benefit of using high datarate may be degraded for IEEE 802.11 based multihop ad hoc networks. In this paper...
Frank Yong Li, Andreas Hafslund, Mariann Hauge, Pa...
117
Voted
ICISC
2004
127views Cryptology» more  ICISC 2004»
15 years 3 months ago
Identity-Based Access Control for Ad Hoc Groups
Abstract. The proliferation of group-centric computing and communication motivates the need for mechanisms to provide group access control. Group access control includes mechanisms...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
119
Voted
CCR
2002
98views more  CCR 2002»
15 years 1 months ago
Efficient flooding with Passive Clustering (PC) in ad hoc networks
An ad hoc network is a fast deployable selfconfiguring wireless network characterized by node mobility, dynamic topology structure, unreliable media and limited power supply. Node...
Taek Jin Kwon, Mario Gerla
ADHOCNOW
2008
Springer
15 years 8 months ago
Distributed Monitoring in Ad Hoc Networks: Conformance and Security Checking
Ad hoc networks are exposed more than traditional networks to security threats due to their mobility and open architecture aspects. In addition, any dysfunction due to badly congu...
Wissam Mallouli, Bachar Wehbi, Ana R. Cavalli