Sciweavers

1624 search results - page 281 / 325
» Requirements for Privacy-Enhancements in Mobile Ad Hoc Netwo...
Sort
View
ICISC
2001
156views Cryptology» more  ICISC 2001»
15 years 3 months ago
A Distributed Light-Weight Authentication Model for Ad-hoc Networks
Abstract. In this work we present a security model for low-value transactions in ad-hoc networks in which we focus on authentication since this is the core requirement for commerci...
André Weimerskirch, Gilles Thonet
87
Voted
PERCOM
2005
ACM
16 years 1 months ago
EZCab: A Cab Booking Application Using Short-Range Wireless Communication
EZCab is a proof-of-concept ubiquitous computing application that allows people to book nearby cabs using their cell phones or PDAs equipped with short-range wireless network inte...
Peng Zhou, Tamer Nadeem, Porlin Kang, Cristian Bor...
IWCMC
2009
ACM
15 years 6 months ago
Scheduling cooperative emergency response: or how the meek shall overcome the greedy
We consider the problem of scheduling emergency responders to geospatially located finite duration temporally bounded tasks. We consider two different schedulers, Greedy and Mee...
Carol Dottin, Bilal Khan
WICON
2008
15 years 3 months ago
HxH: a hop-by-hop transport protocol for multi-hop wireless networks
TCP can perform poorly in multi-hop wireless networks due to problems that arise with contention and mobility. Endto-end protocols are at an inherent disadvantage in trying to sol...
Daniel Scofield, Lei Wang, Daniel Zappala
PERCOM
2011
ACM
14 years 5 months ago
RegReS: Adaptively maintaining a target density of regional services in opportunistic vehicular networks
Abstract—Pervasive vehicle-mounted mobile devices are increasingly common, and can be viewed as a large-scale ad hoc network on which collaborative, location-based services can b...
Emmanouil Koukoumidis, Li-Shiuan Peh, Margaret Mar...