Sciweavers

1558 search results - page 250 / 312
» Mobility helps security in ad hoc networks
Sort
View
ARCS
2006
Springer
15 years 3 months ago
Background Data Acquisition and Carrying: The BlueDACS Project
As an alternative to ad hoc wireless sensor networks, we propose to utilize the mobile devices that are carried by people who walk along the site on which the sensors are deployed....
Thomas Wieland, Martin Fenne, Benjamin Stöcke...
ICW
2005
IEEE
209views Communications» more  ICW 2005»
15 years 5 months ago
Evaluation of Security Mechanisms in Wireless Sensor Networks
— Ad hoc and wireless sensor networks have recently emerged as successful technologies in a number of application domains. The need to build security services into them remains h...
Germano Guimarães, Eduardo Souto, Djamel Fa...
MIDDLEWARE
2004
Springer
15 years 5 months ago
Kernel-middleware interaction to support adaptation in pervasive computing environments
In pervasive computing environments, conditions are highly variable and resources are limited. In order to meet the needs of applications, systems must adapt dynamically to changi...
Farshad A. Samimi, Philip K. McKinley, Seyed Masou...
ISCC
2003
IEEE
15 years 5 months ago
Optimizing the implementation of a MANET routing protocol in a heterogeneous environment
This paper focuses on the implementation of heterogeneous Mobile Ad Hoc networks (MANET). A heterogeneous MANET is a wireless network setting without a fixed infrastructure where...
Carlos Miguel Tavares Calafate, Roman Garcia Garci...
NETGAMES
2003
ACM
15 years 5 months ago
Experiences using a dual wireless technology infrastructure to support ad-hoc multiplayer games
Multiplayer games for mobile wireless devices are becoming increasingly popular. Many modern devices such as PDAs or mobile telephones are equipped with Bluetooth interfaces. Blue...
Hartmut Ritter, Thiemo Voigt, Min Tian, Jochen H. ...