Sciweavers

1030 search results - page 138 / 206
» Protocols Using Anonymous Connections: Mobile Applications
Sort
View
DCOSS
2011
Springer
13 years 9 months ago
Group monitoring in mobile wireless sensor networks
—The need to monitor groups of mobile entities arises in many application contexts. Examples include the study of the social behavior of humans and wildlife, the shepherding of l...
Marco Cattani, Stefan Guna, Gian Pietro Picco
MIDDLEWARE
2004
Springer
15 years 3 months ago
iOverlay: A Lightweight Middleware Infrastructure for Overlay Application Implementations
The very nature of implementing and evaluating fully distributed algorithms or protocols in application-layer overlay networks involves certain programming tasks that are at best m...
Baochun Li, Jiang Guo, Mea Wang
DAIS
2011
14 years 1 months ago
Gozar: NAT-Friendly Peer Sampling with One-Hop Distributed NAT Traversal
Gossip-based peer sampling protocols have been widely used as a building block for many large-scale distributed applications. However, Network Address Translation gateways (NATs) c...
Amir H. Payberah, Jim Dowling, Seif Haridi
ICCCN
2007
IEEE
15 years 4 months ago
k-hop Backbone Formation in Ad Hoc Networks
—Several recent research activities have started to recognize the relevant role of k-hop clustering in Mobile Ad hoc NETworks (MANET) to effectively support many relevant tasks, ...
Paolo Bellavista, Eugenio Magistretti
ICON
2007
IEEE
15 years 4 months ago
Congestion Aware Routing in Hybrid Wireless Mesh Networks
— Multi-radio Wireless Mesh Networks (WMN) are gaining lot of popularity owing to their increased application to community and public safety networks. WMNs form a static wireless...
Asad Amir Pirzada, Ryan Wishart, Marius Portmann