Sciweavers

1030 search results - page 71 / 206
» Protocols Using Anonymous Connections: Mobile Applications
Sort
View
LCN
2003
IEEE
15 years 3 months ago
Strategies for Finding Stable Paths in Mobile Wireless Ad Hoc Networks
In this paper, we introduce statistical methods to estimate the stability of paths in a mobile wireless ad hoc environment. Identifying stable paths helps to reduce control trafï¬...
Michael Gerharz, Christian de Waal, Peter Martini,...
MASS
2010
159views Communications» more  MASS 2010»
14 years 4 months ago
Efficient WiFi deployment algorithms based on realistic mobility characteristics
Abstract--Recent years have witnessed the emergence of numerous new Internet services for mobile users. Supporting mobile applications via public WiFi networks has received signifi...
Tian Wang, Guoliang Xing, Minming Li, Weijia Jia
WMI
2001
114views more  WMI 2001»
14 years 11 months ago
A scalable, distributed middleware service architecture to support mobile internet applications
Middleware layers placed between user clients and application servers have been used to perform a variety of functions to support the vision of nomadic computing across varying pla...
Thomas Phan, Richard G. Guy, Rajive Bagrodia
IFIP
2003
Springer
15 years 3 months ago
Dynamic Device Access for Mobile Users
The Dynamic Device Association (DDA) framework presented in this paper provides service discovery and secure device access for mobile users. We discuss scenarios and requirements f...
Dirk Kutscher, Jörg Ott
JCIT
2008
129views more  JCIT 2008»
14 years 9 months ago
An Enhanced tree based MAODV Protocol for MANETs using Genetic Algorithm
Multicast routing protocols in Mobile Ad-hoc Networks (MANETs) are emerging for wireless group communication which includes application such as multipoint data dissemination and m...
E. Baburaj, V. Vasudevan