Sciweavers

675 search results - page 19 / 135
» Ad Hoc Network Authentication: A Jini-Based Approach
Sort
View
ADHOC
2007
104views more  ADHOC 2007»
13 years 8 months ago
An overlay approach to data security in ad-hoc networks
While it has been argued that application-layer overlay protocols can enhance services in mobile ad-hoc networks, hardly any empirical data is available on the throughput and dela...
Jörg Liebeherr, Guangyu Dong
KIVS
2005
Springer
14 years 1 months ago
Improving the Usable Capacity of Ad Hoc Networks
Recent research has shown that multi-hop ad hoc networks suffer from a low capacity and moreover that an individual node’s capacity for long-distance communication decreases the...
Christian Maihöfer, Tim Leinmüller, Rein...
PIMRC
2010
IEEE
13 years 6 months ago
Power control versus multiuser detection based cross-layer design in wireless ad hoc networks
Abstract--In wireless ad hoc networks, multiple access interference is the limiting factor for the overall system performance. The lack of any central control unit necessitates a c...
Ulrike Korger, Christian Hartmann, Katsutoshi Kusu...
WOWMOM
2005
ACM
135views Multimedia» more  WOWMOM 2005»
14 years 2 months ago
Service Discovery in Mobile Ad Hoc Networks: A Field Theoretic Approach
Service discovery in mobile ad hoc networks is challenging because of the absence of any central intelligence in the network. Traditional solutions as used in the Internet are hen...
Vincent Lenders, Martin May, Bernhard Plattner
INFOCOM
2011
IEEE
12 years 12 months ago
Content management in a mobile ad hoc network: Beyond opportunistic strategy
Abstract—We study the challenging problem of strategic content placement in a dynamic MANET. Existing content placement techniques cannot cope with such network dynamics since th...
Suk-Bok Lee, Starsky H. Y. Wong, Kang-Won Lee, Son...