Sciweavers

576 search results - page 94 / 116
» Overview the Key Management in Ad Hoc Networks
Sort
View
NOMS
2006
IEEE
119views Communications» more  NOMS 2006»
15 years 5 months ago
Runtime Semantic Interoperability for Gathering Ontology-based Network Context
—The trends for pushing more operational intelligence towards network elements to achieve more context-aware and self-managing behavior often requires elements to gather network ...
John Keeney, David Lewis, Declan O'Sullivan, Antoi...
CISS
2008
IEEE
15 years 6 months ago
Resource allocation algorithms for multiuser cooperative OFDMA systems with subchannel permutation
— In this paper, we investigate resource allocation for a multi-user OFDMA cooperative system. Aiming at minimizing the total transmission power under target rate constraints for...
Bo Gui, Leonard J. Cimini Jr.
IEEEIAS
2008
IEEE
15 years 6 months ago
Geolocation-Based Trust for Vanet's Privacy
: Research in Vehicular Ad Hoc NETworks (VANETs) has evolved considerably over the last years. Security and privacy in VANETs have recently appealed special interest in the researc...
Jetzabel Serna, Jesus Luna, Manel Medina
ICPPW
2003
IEEE
15 years 5 months ago
Perfect Secrecy in Wireless Networks
In a classic paper, among a multitude of other security issues, Claude E. Shannon defined perfect secrecy for a pair of secure computers communicating over an insecure link. The ...
Phillip G. Bradford, Olga V. Gavrylyako, Randy K. ...
GIS
2008
ACM
15 years 23 days ago
Spatial queries in disconnected mobile networks
In this paper we study in-network query processing in disconnected mobile environments, where both ad-hoc communication and infrastructure communication are available. Depending o...
Xinjuan Zhu, Bo Xu, Ouri Wolfson