Sciweavers

1267 search results - page 206 / 254
» On the scalability of IEEE 802.11 ad hoc networks
Sort
View
SAINT
2003
IEEE
15 years 5 months ago
Distributed Authentication for Peer-to-Peer Networks
A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Securi...
Shardul Gokhale, Partha Dasgupta
ICRA
2006
IEEE
124views Robotics» more  ICRA 2006»
15 years 5 months ago
Conformable and Scalable Tactile Sensor Skin for Curved Surfaces
Abstract— We present the design and realization of a conformable tactile sensor skin(patent pending). The skin is organized as a network of self-contained modules consisting of t...
Yoshiyuki Ohmura, Yasuo Kuniyoshi, Akihiko Nagakub...
INFOCOM
2009
IEEE
15 years 6 months ago
To Cache or Not To Cache?
—We address cooperative caching in mobile ad hoc networks where information is exchanged in a peer-to-peer fashion among the network nodes. Our objective is to devise a fully-dis...
Marco Fiore, Francesco Mininni, Claudio Casetti, C...
SASO
2008
IEEE
15 years 6 months ago
On a Self-Organizing MANET Event Routing Architecture with Causal Dependency Awareness
Publish/subscribe (P/S) is a communication paradigm of growing popularity for information dissemination in largescale distributed systems. The strong decoupling between informatio...
Guanhong Pei, Binoy Ravindran, E. Douglas Jensen
SECON
2007
IEEE
15 years 6 months ago
Privacy Preserving Communication in MANETs
Abstract— Mobile ad hoc networks often support sensitive applications. These applications may require that users’ identity, location, and correspondents be kept secret. This is...
Heesook Choi, Patrick Drew McDaniel, Thomas F. La ...