Sciweavers

1990 search results - page 348 / 398
» Anonymous communications in mobile ad hoc networks
Sort
View
PERCOM
2006
ACM
14 years 8 months ago
Developing a Model for Trust Management in Pervasive Devices
Pervasive devices interacting in open and dynamic spaces with each others require a mechanism that allows them acting autonomously in a secure way and protecting their resources. ...
Andrés Marín López, Daniel Di...
MOBICOM
2004
ACM
14 years 2 months ago
Revisiting the TTL-based controlled flooding search: optimality and randomization
In this paper we consider the problem of searching for a node or an object (i.e., piece of data, file, etc.) in a large network. Applications of this problem include searching fo...
Nicholas B. Chang, Mingyan Liu
HICSS
2003
IEEE
143views Biometrics» more  HICSS 2003»
14 years 2 months ago
Formation, Routing, and Maintenance Protocols for the BlueRing Scatternet of Bluetooths
The basic networking unit in Bluetooth is piconet, and a larger-area Bluetooth network can be formed by multiple piconets, called scatternet. However, the structure of scatternets...
Ting-Yu Lin, Yu-Chee Tseng, Keng-Ming Chang, Chun-...
PIMRC
2008
IEEE
14 years 3 months ago
Radio resource allocation in OFDMA multihop cellular cooperative networks
Multihop cellular networks (MeNs) is an extension of single hop cellular networks (SCNs) having benefits of a fixed base station and flexible ad hoc networks. The radio resource ma...
Cheol Jeong, Hyung-Myung Kim
ICC
2008
IEEE
121views Communications» more  ICC 2008»
14 years 3 months ago
Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks
—In this paper the performance of unslotted ALOHA and CSMA are analyzed in spatially distributed wireless networks. Users/packets arrive randomly in space and time according to a...
Mariam Kaynia, Nihar Jindal