Sciweavers

671 search results - page 83 / 135
» Trust evaluation in ad-hoc networks
Sort
View
ISCAS
2005
IEEE
146views Hardware» more  ISCAS 2005»
15 years 5 months ago
A novel approach for network on chip emulation
— Current Systems-On-Chip execute applications that demand extensive parallel processing. Networks-On-Chip (NoC) provide a structured way of realizing interconnections on silicon...
Nicolas Genko, David Atienza, Giovanni De Micheli,...
NOMS
2006
IEEE
129views Communications» more  NOMS 2006»
15 years 5 months ago
A Framework for the Decentralisation and Management of Collaborative Applications in Ubiquitous Computing Environments
—When deploying collaborative applications such as Instant Messaging in ubiquitous computing environments significant enhancements can be afforded by offering additional context ...
Karl Quinn, Austin Kenny, Kevin Feeney, David Lewi...
SCN
2010
Springer
120views Communications» more  SCN 2010»
14 years 6 months ago
Identity crisis: on the problem of namespace design for ID-PKC and MANETs
In this paper we explore the "interface" between Identity-based Public Key Cryptography (ID-PKC) and Mobile Ad-hoc Networks (MANETs). In particular we examine the problem...
Shane Balfe, Andrew D. McDonald, Kenneth G. Paters...
ICN
2005
Springer
15 years 5 months ago
Enhancing QoS Through Alternate Path: An End-to-End Framework
In the next generation Internet, the network should not only be considered as a communication medium, but also as an endless source of services available to the end-systems. These ...
Thierry Rakotoarivelo, Patrick Sénac, Aruna...
SPW
1999
Springer
15 years 4 months ago
Performance of Protocols
This paper presents a comprehensive study on the performance of common MANET (mobile ad hoc network) routing protocols under realistic network scenarios. The routing protocols use...
Michael Roe