Sciweavers

1862 search results - page 286 / 373
» Secure Routing for Mobile Ad Hoc Networks
Sort
View
109
Voted
MOBIHOC
2005
ACM
16 years 10 days ago
On the node-scheduling approach to topology control in ad hoc networks
: In this paper, we analyze the node scheduling approach of topology control in the context of reliable packet delivery. In node scheduling, only a minimum set of nodes needed for ...
Budhaditya Deb, Badri Nath
PERCOM
2010
ACM
14 years 11 months ago
HERO: Hybrid Emergency Route-Opening Protocol
—This paper presents an ad-hoc vehicular protocol to support the logistics of first responders. First responders often travel several kilometers to reach an area impacted by an ...
Jonathan Woodbridge, Mars Lan, Giovanni Pau, Mario...
INTERSENSE
2006
ACM
15 years 6 months ago
A context-aware middleware platform for autonomous application services in dynamic wireless networks
— Dynamic wireless networks, and especially mobile ad hoc networks, impose new constraints regarding the design and the implementation of service-oriented middleware platforms de...
Nicolas Le Sommer, Frédéric Guidec, ...
LCN
2005
IEEE
15 years 6 months ago
MAPNaS: A Lightweight, Locality-Aware Peer-to-Peer Based Name Service for MANETs
Name services for mobile ad hoc networks are essential to discover and bind resources given by their name or URI to a specific network address. As there is no fixed infrastructure...
Thomas Zahn, Jochen H. Schiller
91
Voted
MDM
2007
Springer
148views Communications» more  MDM 2007»
15 years 7 months ago
Enforcing Data Integrity in Very Large Ad Hoc Networks
Ad hoc networks rely on nodes forwarding each other’s packets, making trust and cooperation key issues for ensuring network performance. As long as all nodes in the network belo...
Daniela Gavidia, Maarten van Steen