Sciweavers

1835 search results - page 294 / 367
» Security-aware ad hoc routing for wireless networks
Sort
View
EMSOFT
2001
Springer
15 years 2 months ago
A Network-Centric Approach to Embedded Software for Tiny Devices
The ability to incorporate low-power, wireless communication into embedded devices gives rise to a new genre of embedded software that is distributed, dynamic, and adaptive. This p...
David E. Culler, Jason L. Hill, Philip Buonadonna,...
ADHOC
2007
122views more  ADHOC 2007»
14 years 10 months ago
Modeling and analyzing the correctness of geographic face routing under realistic conditions
Geographic protocols are very promising for wireless ad hoc and sensor networks due to the low state storage and low message overhead. Under certain idealized conditions, geograph...
Karim Seada, Ahmed Helmy, Ramesh Govindan
GLOBECOM
2008
IEEE
14 years 11 months ago
A Framework for Dual-Agent MANET Routing Protocols
— Nodes forming mobile ad hoc networks (MANET) nodes can be logically partitioned into 1) a selfish user agent serving the interests of the end user (owner) of the mobile device...
Brian L. Gaines, Mahalingam Ramkumar
BROADNETS
2007
IEEE
15 years 4 months ago
Practical time synchronization for Bluetooth Scatternets
Abstract— By means of so-called Scatternets, Bluetooth provides the ability to construct robust wireless multi-hop networks. In this paper we propose a practical protocol for tim...
Matthias Ringwald, Kay Römer
GLOBECOM
2006
IEEE
15 years 3 months ago
Topology Control for Constant Rate Mobile Networks
Abstract— Controlling the topology of a wireless ad hoc network is very important from the point of view of performance. One known technique for controlling the topology is throu...
Liang Zhao, Errol L. Lloyd, S. S. Ravi