Sciweavers

1464 search results - page 150 / 293
» Worst case mobility in ad hoc networks
Sort
View
MOBIQUITOUS
2007
IEEE
15 years 4 months ago
A Ferry-based Intrusion Detection Scheme for Sparsely Connected Ad Hoc Networks
— Several intrusion detection approaches have been proposed for mobile adhoc networks. Many of the approaches assume that there are sufficient neighbors to help monitor the trans...
Mooi Choo Chuah, Peng Yang, Jianbin Han
MIDDLEWARE
2004
Springer
15 years 3 months ago
Kernel-middleware interaction to support adaptation in pervasive computing environments
In pervasive computing environments, conditions are highly variable and resources are limited. In order to meet the needs of applications, systems must adapt dynamically to changi...
Farshad A. Samimi, Philip K. McKinley, Seyed Masou...
VTC
2007
IEEE
15 years 4 months ago
Mobility-Aware Data Management on Mobile Wireless Networks
— We design a Mobility-aware DAta management (MoDA) scheme for mobile ad hoc networks (MANETs) composed by mobile nodes such as urban pedestrians and vehicles. By fully utilizing...
Akiko Yamasaki, Hirozumi Yamaguchi, Shinji Kusumot...
FGCN
2007
IEEE
127views Communications» more  FGCN 2007»
15 years 4 months ago
A Survey of Routing Protocols for Energy Constrained Ad Hoc Wireless Networks
In this survey we review energy-aware routing protocols for wireless multihop ad hoc networks and critically discuss the main results in this area. The classification presented is...
Natalia Vassileva, Francisco Barceló-Arroyo
PIMRC
2008
IEEE
15 years 4 months ago
The limits of theory: Pragmatic challenges in mobile ad hoc systems
—The development of mobile ad hoc systems have considerably emphasized the need for a better understanding of the factors that influence the systems’ performance, i.e., mobili...
Franck Legendre, Martin May, Vincent Lenders, Gunn...