Sciweavers

1524 search results - page 63 / 305
» Adapting BitTorrent to Wireless Ad Hoc Networks
Sort
View
PERCOM
2007
ACM
14 years 8 months ago
A three round authenticated group key agreement protocol for ad hoc networks
Group Key Agreement (GKA) protocols enable the participants to derive a key based on each one's contribution over a public network without any central authority. They also pr...
Daniel Augot, Raghav Bhaskar, Valérie Issarny, Da...
GLOBECOM
2007
IEEE
14 years 3 months ago
Detection of Colluding Misbehaving Nodes in Mobile Ad Hoc and Wireless Mesh Networks
Abstract—Ubiquitous network connectivity and mobile communications have recently attracted remarkable attention. Wireless multihop networks such as Mobile Ad hoc Networks or Wire...
Kalman Graffi, Parag S. Mogre, Matthias Hollick, R...
INFOCOM
2012
IEEE
11 years 11 months ago
Toward simple criteria to establish capacity scaling laws for wireless networks
Abstract—Capacity scaling laws offer fundamental understanding on the trend of user throughput behavior when the network size increases. Since the seminal work of Gupta and Kumar...
Canming Jiang, Yi Shi, Y. Thomas Hou, Wenjing Lou,...
COORDINATION
2007
Springer
14 years 3 months ago
Object-Oriented Coordination in Mobile Ad Hoc Networks
Abstract. We introduce an object-oriented referencing abstraction to express coordination between objects hosted on mobile devices interconnected by a wireless ad hoc network. On t...
Tom Van Cutsem, Jessie Dedecker, Wolfgang De Meute...
PERCOM
2006
ACM
14 years 2 months ago
DHT-based Unicast for Mobile Ad Hoc Networks
As mobile ad hoc networks (MANETs) become ever more popular, it also becomes more and more interesting to build distributed network applications (e.g. data storage, etc.) that hav...
Thomas Zahn, Jochen H. Schiller