Sciweavers

289 search results - page 27 / 58
» adhoc 2006
Sort
View
ADHOC
2007
134views more  ADHOC 2007»
14 years 9 months ago
Threshold password authentication against guessing attacks in Ad hoc networks
Password authentication has been accepted as one of the commonly used solutions in network environment to protect resources from unauthorized access. The emerging mobile Ad hoc ne...
Zhenchuan Chai, Zhenfu Cao, Rongxing Lu
54
Voted
WETICE
2006
IEEE
15 years 3 months ago
PINCET - Process Integration of Collaborative Enterprises
Enterprises more and more collaborate with other enterprises in networked organizations. Such collaborations require the business processes of the partner companies to be aligned ...
Rik Eshuis, Heiko Ludwig
ADHOC
2006
116views more  ADHOC 2006»
14 years 9 months ago
Efficient clustering algorithms for self-organizing wireless sensor networks
Self-organization of wireless sensor networks, which involves network decomposition into connected clusters, is a challenging task because of the limited bandwidth and energy reso...
Rajesh Krishnan, David Starobinski
ADHOC
2006
155views more  ADHOC 2006»
14 years 9 months ago
Application versus network layer multicasting in ad hoc networks: the ALMA routing protocol
Application layer multicasting has emerged as an appealing alternative to network layer multicasting in wireline networks. Here, we examine the suitability of application layer mu...
Min Ge, Srikanth V. Krishnamurthy, Michalis Falout...
ADHOC
2006
97views more  ADHOC 2006»
14 years 9 months ago
A probabilistic algorithm for efficient and robust data propagation in wireless sensor networks
We study the problem of data propagation in sensor networks, comprised of a large number of very small and low-cost nodes, capable of sensing, communicating and computing. The dis...
Ioannis Chatzigiannakis, Tassos Dimitriou, Sotiris...