Sciweavers

211 search results - page 35 / 43
» Identity-Based Access Control for Ad Hoc Groups
Sort
View
SOCA
2007
IEEE
14 years 1 months ago
Negotiating Agreements Using Policies in Ubiquitous Computing Scenarios
The emerging ubiquitous computing vision is characterized by decentralized and ad hoc interoperation among devices and networks for access to services. Interacting devices or grou...
Venkatraman Ramakrishna, Kevin Eustice, Peter L. R...
ISCC
2006
IEEE
190views Communications» more  ISCC 2006»
14 years 1 months ago
Time-Critical Underwater Sensor Diffusion with No Proactive Exchanges and Negligible Reactive Floods
— In this paper we study multi-hop ad hoc routing in a scalable Underwater Sensor Network (UWSN), which is a novel network paradigm for ad hoc investigation of the world below th...
Uichin Lee, Jiejun Kong, Joon-Sang Park, Eugenio M...
HICSS
2005
IEEE
166views Biometrics» more  HICSS 2005»
14 years 1 months ago
Prototyping the Emergence of Collaborative Knowledge
E-learning growth is driven by global, societal, and technological changes that both enable and require increased worker and learner mobility, access to distributed domain experti...
Rita M. Vick, Apperson H. Johnson
ICAS
2005
IEEE
111views Robotics» more  ICAS 2005»
14 years 1 months ago
COOP - A cooperative caching service in MANETs
Data access applications in Mobile Ad Hoc Networks (MANETs) suffer from intermittent network connections and restricted power supplies. While most of the researches focus on Media...
Yu Du, Sandeep K. S. Gupta
GLOBECOM
2006
IEEE
14 years 1 months ago
The Head-of-Line Blocking Problem on Exposed Terminals in MANETs
— In Mobile Ad Hoc Networks (MANETs), the hidden and the exposed terminal problems affect the throughput of the Medium Access Control (MAC) protocols. Several MAC schemes have be...
Jing Deng, Yi Qian