Abstract—Dummy-based anonymization techniques for protecting location privacy of mobile users have been proposed in the literature. By generating dummies that move in humanlike t...
Abstract— Natural or man-made disasters can partition networks while threatening human lives. Because conventional Mobile Ad-Hoc Networks (MANETs) cannot route messages across pa...
of the hardware abstraction layer and of selected core middleware services. The latter enable a mobile device to store and retrieve data and position information in physical places...
We consider the case of sparse mobile sensors deployed to implement missions in challenging environments. This paper explores a notion of tour networks that is well suited to circ...
We explore the idea of using relay nodes with controllable mobility as intermediate hops for reducing the power consumption in a mobile ad hoc network (MANET). We formulate the re...
Eashwar R. Chittimalla, Aravindhan Venkateswaran, ...