Sciweavers

1259 search results - page 165 / 252
» An Efficient Mobile Authentication Scheme for Wireless Netwo...
Sort
View
NETWORK
2007
187views more  NETWORK 2007»
13 years 7 months ago
Cooperative and opportunistic transmission for wireless ad hoc networks
Moving toward 4G, wireless ad hoc networks receive growing interest due to users’ provisioning of mobility, usability of services, and seamless communications. In ad hoc network...
Qian Zhang, Qing Chen, Fan Yang, Xuemin Shen, Zhis...
MOBIHOC
2002
ACM
14 years 7 months ago
Weak duplicate address detection in mobile ad hoc networks
Auto-configuration is a desirable goal in implementing mobile ad hoc networks. Specifically, automated dynamic assignment (without manual intervention) of IP addresses is desirabl...
Nitin H. Vaidya
APNOMS
2006
Springer
13 years 12 months ago
Improved Handoff Performance Based on Pre-binding Update in HMIPv6
Abstract. In this paper, an efficient neighbor AR (Access Router) discovery scheme and handoff procedure using neighbor information are proposed. It allows each AR and Mobility Anc...
Jongpil Jeong, Min Young Chung, Hyunseung Choo
PERCOM
2009
ACM
14 years 8 months ago
A Policy-Based Management Architecture for Mobile Collaborative Teams
Many missions are deemed dangerous or impractical to perform by humans, but can use collaborating, self-managing Unmanned Autonomous Vehicles (UAVs) which adapt their behaviour to ...
Eskindir Asmare, Anandha Gopalan, Morris Sloman, N...
TWC
2008
142views more  TWC 2008»
13 years 8 months ago
Cooperative Diversity in Interference Limited Wireless Networks
Using relays in wireless networks can potentially lead to significant capacity increases. However, within an asynchronous multi-user communication setting, relaying might cause mor...
Sam Vakil, Ben Liang