Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content excha...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
Multi-hop ad hoc networks are envisioned to be an integral part of future mobile networks. Today, however, ad hoc networks lack the necessary resilience and reliability. This work ...
The class of wireless and mobile networks features a dissimilar set of characteristics and constraints compared to traditional fixed networks. The various dimensions of these char...
Matthias Hollick, Ivan Martinovic, Tronje Krop, Iv...
This work is about the integration of the skills robot control, landmark recognition, and qualitative reasoning in a single autonomous mobile system. It deals with the transfer of ...
— Motivated by the recent findings of super-diffusive patterns in mobility traces, we investigate the impact of superdiffusive behavior of mobile nodes on contact-based metrics ...