Sciweavers

1165 search results - page 176 / 233
» Secure data communication in mobile ad hoc networks
Sort
View
97
Voted
SISW
2005
IEEE
15 years 7 months ago
Adding Secure Deletion to Your Favorite File System
Files or even their names often contain confidential or secret information. Most users believe that such information is erased as soon as they delete a file. Even those who know...
Nikolai Joukov, Erez Zadok
ICPPW
2002
IEEE
15 years 6 months ago
ARA - The Ant-Colony Based Routing Algorithm for MANETs
A mobile ad-hoc network (MANET) is a collection of mobile nodes which communicate over radio. These kind of networks are very flexible, thus they do not require any existing infr...
Mesut Günes, Udo Sorges, Imed Bouazizi
115
Voted
ISCC
2003
IEEE
15 years 7 months ago
Optimizing the implementation of a MANET routing protocol in a heterogeneous environment
This paper focuses on the implementation of heterogeneous Mobile Ad Hoc networks (MANET). A heterogeneous MANET is a wireless network setting without a fixed infrastructure where...
Carlos Miguel Tavares Calafate, Roman Garcia Garci...
127
Voted
ACMICEC
2003
ACM
182views ECommerce» more  ACMICEC 2003»
15 years 7 months ago
eNcentive: a framework for intelligent marketing in mobile peer-to-peer environments
In recent years, the growth of Mobile Computing, Electronic Commerce and Mobile Electronic Commerce has created a new concept of Mobile Electronic Marketing. New marketing models ...
Olga Ratsimor, Timothy W. Finin, Anupam Joshi, Yel...
134
Voted
PEWASUN
2006
ACM
15 years 7 months ago
Wave propagation using the photon path map
In wireless network planning, much effort is spent on the improvement of the network and transport layer – especially for Mobile Ad Hoc Networks. Although in principle realworl...
Arne Schmitz, Leif Kobbelt