Sciweavers

1835 search results - page 317 / 367
» Security-aware ad hoc routing for wireless networks
Sort
View
INFOCOM
2006
IEEE
15 years 3 months ago
A Packing Approach to Compare Slotted and Non-Slotted Medium Access Control
— In multi-hop ad hoc networks, the efficiency of a medium access control protocol under heavy traffic load depends mainly on its ability to schedule a large number of simultan...
Mathilde Durvy, Patrick Thiran
PERCOM
2005
ACM
15 years 9 months ago
EZCab: A Cab Booking Application Using Short-Range Wireless Communication
EZCab is a proof-of-concept ubiquitous computing application that allows people to book nearby cabs using their cell phones or PDAs equipped with short-range wireless network inte...
Peng Zhou, Tamer Nadeem, Porlin Kang, Cristian Bor...
ICALT
2008
IEEE
15 years 4 months ago
A Pervasive Assessment System: Extending QTI to Incorporate Ad-hoc Wireless Sensors
Ad-hoc sensor networks provide a cheap and scalable technology for constructing pervasive learning assessment systems that are embedded in physical environments. This paper propos...
Imran A. Zualkernan, Ahmed Wasfy, Imad Zabalawi, M...
WINET
2008
100views more  WINET 2008»
14 years 9 months ago
SOLONet: Sub-optimal location-aided overlay network for MANETs
Overlay networks have made it easy to implement multicast functionality in wireless ad hoc networks. Their flexibility to adapt to different environments has helped in their stead...
Abhishek P. Patil, Yunhao Liu, Li Xiao, Abdol-Hoss...
MONET
2010
170views more  MONET 2010»
14 years 8 months ago
A Framework for Engineering Pervasive Applications Applied to Intra-vehicular Sensor Network Applications
The vehicle sector is one of the most exciting application areas for wireless ad hoc networks and pervasive computing technologies. Vehicles are constantly being equipped with more...
Antonio Coronato, Giuseppe De Pietro, Jong Hyuk Pa...