Sciweavers

675 search results - page 40 / 135
» Ad Hoc Network Authentication: A Jini-Based Approach
Sort
View
WASA
2010
Springer
288views Algorithms» more  WASA 2010»
13 years 6 months ago
Approaching the Optimal Schedule for Data Aggregation in Wireless Sensor Networks
Abstract. Due to the large-scale ad hoc deployments and wireless interference, data aggregation is a fundamental but time consuming task in wireless sensor networks. This paper foc...
Pei Wang, Yuan He, Liusheng Huang
AINA
2010
IEEE
14 years 1 months ago
Service Invocation over Content-Based Communication in Disconnected Mobile Ad Hoc Networks
—This paper presents a middleware platform for the provision of services in disconnected MANETs, focusing on service invocation. This middleware exploits content-based communicat...
Yves Mahéo, Romeo Said
MOBIHOC
2000
ACM
14 years 26 days ago
Dynamic quality-of-service for mobile ad hoc networks
In this paper we discuss the dynamic network characteristics of mobile ad hoc networks, and explore problems that arise when attempting to provide QoS support in this environment....
M. Mirhakkak, N. Schult, D. Thomson
IPCCC
2006
IEEE
14 years 2 months ago
Overcoming the challenge of security in a mobile environment
The secure operation of ad hoc networks faces the novel challenge of location verification on top of the security challenges that wireline networks face. The novelty lies in the ...
Ioannis Broustis, Michalis Faloutsos, Srikanth V. ...
INFOCOM
2008
IEEE
14 years 2 months ago
Embracing Interference in Ad Hoc Networks Using Joint Routing and Scheduling with Multiple Packet Reception
— We present an approach that takes advantage of multi-packet reception (MPR) to reduce the negative effects of multiple access interference and therefore increase the capacity o...
Xin Wang, J. J. Garcia-Luna-Aceves