Abstract— By means of so-called Scatternets, Bluetooth provides the ability to construct robust wireless multi-hop networks. In this paper we propose a practical protocol for tim...
Abstract. In this work we present a security model for low-value transactions in ad-hoc networks in which we focus on authentication since this is the core requirement for commerci...
Design, development and evaluation of adaptive, scalable, and power aware Bio/Nature inspired routing protocols has received a significant amount of attention in the recent past....
Abstract: For evaluating dynamics of mobile ad-hoc networks at least three different layers have to be distinguished: the application layer, the protocol layer, and the network lay...
Epidemics-inspired techniques have received huge attention in recent years from the distributed systems and networking communities. These algorithms and protocols rely on probabili...