Sciweavers

322 search results - page 28 / 65
» Anonymous Content Sharing in Ad Hoc Networks
Sort
View
ADHOC
2007
104views more  ADHOC 2007»
13 years 8 months ago
Performance benchmarking of wireless Web servers
ct 8 The advent of mobile computers and wireless networks enables the deployment of wireless Web servers and clients in 9 short-lived ad hoc network environments, such as classroom...
Guangwei Bai, Kehinde Oladosu, Carey L. Williamson
FC
2007
Springer
125views Cryptology» more  FC 2007»
14 years 2 months ago
Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups
Task-specific groups are often formed in an ad-hoc manner within big structures, like companies. Take the following typical scenario: A high rank manager decides that a task force...
Yvo Desmedt, Tanja Lange, Mike Burmester
IWCMC
2009
ACM
14 years 3 months ago
Probabilistic counter-based route discovery for mobile ad hoc networks
Conventional on-demand route discovery for ad hoc routing protocols extensively use simple flooding, which could potentially lead to high channel contention, causing redundant ret...
Aminu Mohammed, Mohamed Ould-Khaoua, Lewis M. Mack...
ICC
2007
IEEE
168views Communications» more  ICC 2007»
14 years 2 months ago
Opportunistic Link Scheduling with QoS Requirements in Wireless Ad Hoc Networks
— In this paper, we study the link layer scheduling problem in wireless ad hoc networks. In such a network, the communication links compete for the scarce and time-varying wirele...
Qing Chen, Qian Zhang, Zhisheng Niu
INFOCOM
2006
IEEE
14 years 2 months ago
Efficient Flooding Scheme Based on 1-Hop Information in Mobile Ad Hoc Networks
—Flooding is one of the most fundamental operations in mobile ad hoc networks. Traditional implementation of flooding suffers from the problems of excessive redundancy of message...
Hai Liu, Peng-Jun Wan, Xiaohua Jia, Xinxin Liu, F....