Sciweavers

644 search results - page 35 / 129
» Adaptive security protocol selection for mobile computing
Sort
View
AINA
2006
IEEE
14 years 2 months ago
Adaptive Timeout Policies for Wireless Links
— A considerable body of evidence indicates that the use of reliable link layer protocols over error prone wireless links dramatically improves the performance of Internet protoc...
George Xylomenos, Christos Tsilopoulos
INFOCOM
2010
IEEE
13 years 7 months ago
Castor: Scalable Secure Routing for Ad Hoc Networks
—Wireless ad hoc networks are inherently vulnerable, as any node can disrupt the communication of potentially any other node in the network. Many solutions to this problem have b...
Wojciech Galuba, Panos Papadimitratos, Marcin Potu...
JACIII
2007
104views more  JACIII 2007»
13 years 8 months ago
Adaptive Action Selection of Body Expansion Behavior in Multi-Robot System Using Communication
In multi-robot system, cooperation is needed to execute tasks efficiently. The purpose of this study is to realize cooperation among multiple robots using interactive communicatio...
Tomohisa Fujiki, Kuniaki Kawabata, Hajime Asama
AINA
2007
IEEE
14 years 2 months ago
A Utility-Based Adaptivity Model for Mobile Applications
Mobile environments are characterized by resource fluctuations and limitations, and variations in user preferences. Therefore mobile applications need to be adaptive to retain us...
Mourad Alia, Viktor S. Wold Eide, Nearchos Paspall...
MOBIQUITOUS
2005
IEEE
14 years 2 months ago
Content-Based Routing in Mobile Ad Hoc Networks
The publish/subscribe model of communication provides sender/receiver decoupling and selective information dissemination that is appropriate for mobile environments characterized ...
Milenko Petrovic, Vinod Muthusamy, Hans-Arno Jacob...