Sciweavers

1030 search results - page 42 / 206
» Protocols Using Anonymous Connections: Mobile Applications
Sort
View
RAID
2010
Springer
14 years 8 months ago
Anomaly Detection and Mitigation for Disaster Area Networks
Abstract. One of the most challenging applications of wireless networking are in disaster area networks where lack of infrastructure, limited energy resources, need for common oper...
Jordi Cucurull, Mikael Asplund, Simin Nadjm-Tehran...
NCA
2003
IEEE
15 years 3 months ago
Organizing a Distributed Application in a Mobile Ad Hoc Network
A distributed application that operates in an ad hoc network formed by mobile nodes must limit its use of all-to-all communication since the overall capacity of such a network is ...
Cristian Tuduce, Thomas R. Gross
ICT
2004
Springer
158views Communications» more  ICT 2004»
15 years 3 months ago
MobiS: A Solution for the Development of Secure Applications for Mobile Devices
With the mobile computing evolution, portable devices have emerged in the market with the possibility of connection to IP networks using wireless technologies. The migration from f...
Windson Viana, José Bringel Filho, Katy C. ...
ADHOC
2006
155views more  ADHOC 2006»
14 years 9 months ago
Application versus network layer multicasting in ad hoc networks: the ALMA routing protocol
Application layer multicasting has emerged as an appealing alternative to network layer multicasting in wireline networks. Here, we examine the suitability of application layer mu...
Min Ge, Srikanth V. Krishnamurthy, Michalis Falout...
111
Voted
KES
2004
Springer
15 years 3 months ago
Supporting Smart Applications in Multihop Ad-Hoc Networks - The GecGo Middleware
The goal of the GecGo middleware is to provide all the services required by self-organizing distributed applications running on multihop ad-hoc networks. Because of the frequent as...
Peter Sturm, Hannes Frey, Daniel Görgen, Joha...