Sciweavers

3810 search results - page 210 / 762
» Using mobile agents for network performance management
Sort
View
ICSNC
2007
IEEE
15 years 10 months ago
Using the mobile phone as a security token for unified authentication
- The number of different identities and credentials used for authentication towards services on the Internet has increased beyond the manageable. Still, the most common authentica...
Steffen Hallsteinsen, Ivar Jørstad, Do Van ...
SAJ
2002
127views more  SAJ 2002»
15 years 3 months ago
Limited flooding protocol for mobile ad hoc networks
Mobile ad hoc networks are collections of mobile nodes without any fixed infrastructure or central co-ordinating mechanism for packet routing. Consequently, routing is a challenge...
Mieso K. Denko, W. Goddard
ICRA
2006
IEEE
120views Robotics» more  ICRA 2006»
15 years 10 months ago
Autonomous Enhancement of Disruption Tolerant Networks
— Mobile robots have successfully solved many real world problems. In the following we present the use of mobile robots to address the novel and challenging problem of providing ...
Brendan Burns, Oliver Brock, Brian Neil Levine
WIMOB
2007
IEEE
15 years 10 months ago
Analysis of Group Key Management Protocols for Secure Multicasting in Vehicular Software Distribution Network
—In this paper we investigate the issues in designing key management architecture for secure multicasting in remote software distribution to advance vehicles. We consider the Veh...
Irina Hossain, Syed Masud Mahmud
INFOCOM
2007
IEEE
15 years 10 months ago
Modeling Time-Variant User Mobility in Wireless Mobile Networks
Abstract— Realistic mobility models are important to understand the performance of routing protocols in wireless ad hoc networks, especially when mobility-assisted routing scheme...
Wei-jen Hsu, Thrasyvoulos Spyropoulos, Konstantino...