Sciweavers

2691 search results - page 127 / 539
» Securing Ad Hoc Networks
Sort
View
MOBIHOC
2008
ACM
16 years 4 months ago
Hidden information and actions in multi-hop wireless ad hoc networks
Xiang-Yang Li, Yanwei Wu, Ping Xu, Guihai Chen, Mo...
SOCA
2007
IEEE
15 years 11 months ago
Negotiating Agreements Using Policies in Ubiquitous Computing Scenarios
The emerging ubiquitous computing vision is characterized by decentralized and ad hoc interoperation among devices and networks for access to services. Interacting devices or grou...
Venkatraman Ramakrishna, Kevin Eustice, Peter L. R...
TPDS
2008
126views more  TPDS 2008»
15 years 4 months ago
Efficient Directional Network Backbone Construction in Mobile Ad Hoc Networks
In this paper, we consider the issue of constructing an energy-efficient virtual network backbone in mobile ad hoc networks (MANETs) for broadcasting applications using directiona...
Shuhui Yang, Jie Wu, Fei Dai
NCA
2005
IEEE
15 years 10 months ago
Location-based Publish/Subscribe
This paper introduces the concept of location-based publish/subscribe (LPS), which allows mobile ad hoc applications to anonymously communicate with each other, depending on their...
Patrick Th. Eugster, Benoît Garbinato, Adria...
INFOCOM
2003
IEEE
15 years 10 months ago
Random Waypoint Considered Harmful
— This study examines the random waypoint model widely used in the simulation studies of mobile ad hoc networks. Our findings show that this model fails to provide a steady stat...
Jungkeun Yoon, Mingyan Liu, Brian Noble