Sciweavers

1558 search results - page 229 / 312
» Mobility helps security in ad hoc networks
Sort
View
PERCOM
2007
ACM
15 years 11 months ago
Fundamental Mobility Properties for Realistic Performance Analysis of Intermittently Connected Mobile Networks
Traditional mobile ad hoc routing protocols fail to deliver any data in Intermittently Connected Mobile Ad Hoc Networks (ICMN's) because of the absence of complete end-to-end ...
Apoorva Jindal, Konstantinos Psounis
CGA
2008
15 years 13 hour ago
Mobile Phone-Enabled Museum Guidance with Adaptive Classification
We present an adaptive museum guidance system called PhoneGuide. It uses camera-equipped mobile phones for on-device object recognition in ad-hoc sensor networks and provides locat...
Erich Bruns, Benjamin Brombach, Oliver Bimber
PE
2007
Springer
175views Optimization» more  PE 2007»
14 years 11 months ago
Delay and resource analysis in MANETs in presence of throwboxes
This paper addresses the delay analysis and resource consumption in mobile ad hoc networks (MANETs) equipped with throwboxes. Throwboxes are stationary, wireless devices that act ...
Mouhamad Ibrahim, Ahmad Al Hanbali, Philippe Nain
SASN
2006
ACM
15 years 5 months ago
Impact of optimal MAC layer attacks on the network layer
Node misbehavior in wireless ad hoc networks leads to sudden unpredictable changes in network topology, resulting in fluctuation of traffic load and capacity for already existin...
Svetlana Radosavac, John S. Baras, George V. Moust...
DAGSTUHL
2006
15 years 1 months ago
Managing power amongst a group of networked embedded fpgas using dynamic reconfiguration and task migration
Small unpiloted aircraft (UAVs) each have limited power budgets. If a group (swarm) of small UAVs is organised to perform a common task such as geo-location, then it is possible t...
David A. Kearney, Mark Jasiunas