Sciweavers

933 search results - page 51 / 187
» A structured group mobility model for the simulation of mobi...
Sort
View
ICDE
2010
IEEE
185views Database» more  ICDE 2010»
14 years 2 months ago
A tuple space for social networking on mobile phones
Abstract— Social networking is increasingly becoming a popular means of communication for online users. The trend is also true for offline scenarios where people use their mobil...
Emre Sarigöl, Oriana Riva, Gustavo Alonso
PE
2007
Springer
175views Optimization» more  PE 2007»
13 years 7 months ago
Delay and resource analysis in MANETs in presence of throwboxes
This paper addresses the delay analysis and resource consumption in mobile ad hoc networks (MANETs) equipped with throwboxes. Throwboxes are stationary, wireless devices that act ...
Mouhamad Ibrahim, Ahmad Al Hanbali, Philippe Nain
ISCC
2008
IEEE
119views Communications» more  ISCC 2008»
14 years 2 months ago
Analyzing a human-based trust model for mobile ad hoc networks
— This paper analyzes a trust model for mobile ad hoc networks. We provide nodes with a mechanism to build a trust relationship with its neighbors. The proposed model considers t...
Pedro B. Velloso, Rafael P. Laufer, Otto Carlos Mu...
MOBIHOC
2000
ACM
14 years 2 days ago
Content based multicast (CBM) in ad hoc networks
Abstract— This paper presents a radically new multicast model for ad hoc wireless networks. In this model, the content of the multicast data determines the receiver set for the d...
Hu Zhou, Suresh Singh
TIFS
2010
130views more  TIFS 2010»
13 years 2 months ago
On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol
Access control is the fundamental security service in ad hoc groups. It is needed not only to prevent unauthorized entities from joining the group, but also to bootstrap other secu...
Stanislaw Jarecki, Nitesh Saxena