Sciweavers

211 search results - page 26 / 43
» Identity-Based Access Control for Ad Hoc Groups
Sort
View
ICDCS
2005
IEEE
14 years 1 months ago
Handling Asymmetry in Power Heterogeneous Ad Hoc Networks: A Cross Layer Approach
Power heterogeneous ad hoc networks are characterized by link layer asymmetry: the ability of lower power nodes to receive transmissions from higher power nodes but not vice versa...
Vasudev Shah, Srikanth V. Krishnamurthy
ICPP
2006
IEEE
14 years 1 months ago
Improving Spatial Reuse with Collision-Aware DCF in Mobile Ad Hoc Networks
—Carrier sensing is a medium access method widely adopted in wireless communication to protect data transfers from interference. For example, Distributed Coordination Function (D...
Lubo Song, Chansu Yu
ATAL
2004
Springer
14 years 1 months ago
Groups of Collaborating Users and Agents in Ambient Intelligent Environments
An ad hoc agent environment is a way for users to interact with an ambient intelligent environment. Agents are associated with every device, service or content. Utilizing agents, ...
Jan M. V. Misker, Cor J. Veenman, Léon J. M...
NETWORKING
2004
13 years 9 months ago
Combining Source- and Localized Recovery to Achieve Reliable Multicast in Multi-hop Ad Hoc Networks
This paper proposes a novel reliable multicast transport protocol for multi-hop, wireless ad hoc networks (or MANETs). To recover from the different types of losses that may occur ...
Venkatesh Rajendran, Katia Obraczka, Yunjung Yi, S...
IPCCC
2007
IEEE
14 years 1 months ago
Applications of the Oriented Permission Role-Based Access Control Model
Role-based access control and role hierarchies have been the subject of considerable research in recent years. In this paper, we consider three useful applications of a new role-b...
Liang Chen, Jason Crampton