Sciweavers

1631 search results - page 240 / 327
» Mobility Management
Sort
View
PUC
2008
117views more  PUC 2008»
15 years 4 months ago
Designing for privacy and self-presentation in social awareness
Social awareness applications are based on the idea of a group sharing real-time context information via personal and ubiquitous terminals. Studies of such applications have shown ...
Mika Raento, Antti Oulasvirta
164
Voted
WD
2010
15 years 3 months ago
Content Centric Networking in tactical and emergency MANETs
Abstract--Reliable and secure content distribution in a disruptive environment is a critical challenge due to high mobile and lossy channels. Traditional IP networking and wireless...
Soon-Young Oh, Davide Lau, Mario Gerla
168
Voted
WD
2010
15 years 3 months ago
Vicinity resource cartography for delay-tolerant networks: A holistic perspective
In this paper we propose a distributed approach to construct vicinity resource maps at each node in a delaytolerant network. The scheme uses recent encounters to estimate the avail...
Gabriel Sandulescu, Péter Schaffer, Simin N...
160
Voted
IJNSEC
2011
77views more  IJNSEC 2011»
15 years 9 days ago
Performance Evaluation of the TSS Node Authentication Scheme in Noisy MANETs
This paper presents a description and performance evaluation of a threshold secret sharing (TSS) node authentication scheme in noisy mobile ad hoc networks (MANETs). The scheme ca...
Hussein Al-Bahadili, Shakir Hussain, Ghassan Issa,...
199
Voted
IAJIT
2011
14 years 8 months ago
Network load and packet loss optimization during handoff using multi-scan approach
: Handoff is a critical function that enables mobile nodes to stay connected to the wireless network by switching the data connection from one WLAN to another. During handoff the c...
Anwar Saif, Mohammed Othman