Sciweavers

1835 search results - page 339 / 367
» Security-aware ad hoc routing for wireless networks
Sort
View
PERCOM
2010
ACM
14 years 8 months ago
HERO: Hybrid Emergency Route-Opening Protocol
—This paper presents an ad-hoc vehicular protocol to support the logistics of first responders. First responders often travel several kilometers to reach an area impacted by an ...
Jonathan Woodbridge, Mars Lan, Giovanni Pau, Mario...
177
Voted
ICDE
2006
IEEE
108views Database» more  ICDE 2006»
15 years 11 months ago
Skyline Queries Against Mobile Lightweight Devices in MANETs
Skyline queries are well suited when retrieving data according to multiple criteria. While most previous work has assumed a centralized setting this paper considers skyline queryi...
Zhiyong Huang, Christian S. Jensen, Hua Lu, Beng C...
PERCOM
2009
ACM
15 years 4 months ago
Distributed Policy Resolution Through Negotiation in Ubiquitous Computing Environments
—Ensuring spontaneous ad hoc interoperation in decentralized ubiquitous computing environments is challenging, because of heterogeneous resources and divergent policies. Centrali...
Venkatraman Ramakrishna, Peter L. Reiher, Leonard ...
83
Voted
ICDCSW
2008
IEEE
15 years 4 months ago
Pairing Devices with Good Quality Output Interfaces
The operation of achieving authenticated key agreement between two human-operated devices over a short range wireless communication channel, such as Bluetooth or WiFi, is known as...
Nitesh Saxena, Jonathan Voris
MSWIM
2005
ACM
15 years 3 months ago
Huginn: a 3D visualizer for wireless ns-2 traces
Discrete-event network simulation is a major tool for the research and development of mobile ad-hoc networks (MANETs). These simulations are used for debugging, teaching, understa...
Björn Scheuermann, Holger Füßler, ...