Sciweavers

1835 search results - page 142 / 367
» Security-aware ad hoc routing for wireless networks
Sort
View
EWSN
2006
Springer
15 years 10 months ago
Constraint-Based Distance Estimation in Ad-Hoc Wireless Sensor Networks
Abstract. We propose a lightweight localisation approach for supporting distance and range queries in ad hoc wireless sensor networks. In contrast to most previous localisation app...
Urs Bischoff, Martin Strohbach, Mike Hazas, Gerd K...
93
Voted
INFOCOM
2003
IEEE
15 years 4 months ago
On-demand Power Management for Ad Hoc Networks
— Battery power is an important resource in ad hoc networks. It has been observed that in ad hoc networks, energy consumption does not reflect the communication activities in th...
Rong Zheng, Robin Kravets
105
Voted
MOBIHOC
2001
ACM
15 years 10 months ago
Geometric spanner for routing in mobile networks
We propose a new routing graph, the Restricted Delaunay Graph (RDG), for ad hoc networks. Combined with a node clustering algorithm, RDG can be used as an underlying graph for geo...
Jie Gao, Leonidas J. Guibas, John Hershberger, Li ...
ICC
2009
IEEE
167views Communications» more  ICC 2009»
15 years 5 months ago
QoS Enhancement and Performance Evaluation of Ad-Hoc Routing Protocols for Rural Public Safety
—In this paper, we explore the feasibility of using Mobile Ad-hoc Networks (MANETs) for rural public safety. First, we discuss a QoS enhancement to a standard routing protocol, D...
Chad Bohannan, Li Zhang, Jian Tang, Richard S. Wol...
91
Voted
CN
2007
172views more  CN 2007»
14 years 11 months ago
Threshold cryptography in P2P and MANETs: The case of access control
Ad hoc groups, such as peer-to-peer (P2P) systems and mobile ad hoc networks (MANETs) represent recent technological advancements. They support low-cost, scalable and fault-tolera...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi