Sciweavers

645 search results - page 127 / 129
» Interest-Based Lookup Protocols for Mobile Ad Hoc Networks
Sort
View
MIDDLEWARE
2004
Springer
14 years 22 days ago
Adaptive resource discovery for ubiquitous computing
The terms pervasive and ubiquitous computing are used to describe a smart space populated by hundreds of intelligent devices that are embedded in their surroundings. Characteristi...
Rae Harbird, Stephen Hailes, Cecilia Mascolo
SPAA
2005
ACM
14 years 29 days ago
Constant density spanners for wireless ad-hoc networks
An important problem for wireless ad hoc networks has been to design overlay networks that allow time- and energy-efficient routing. Many local-control strategies for maintaining...
Kishore Kothapalli, Christian Scheideler, Melih On...
ICOIN
2004
Springer
14 years 23 days ago
A Routing Strategy for Metropolis Vehicular Communications
One of the major issues that affect the performance of mobile ad hoc networks (MANET) is routing. Recently, position-based routing for MANET is found to be a very promising routin...
Genping Liu, Bu-Sung Lee, Boon-Chong Seet, Chuan H...
IWSEC
2010
Springer
13 years 5 months ago
Securing MANET Multicast Using DIPLOMA
Multicast traffic, such as live audio/video streaming, is an important application for Mobile Ad Hoc Networks (MANETs), including those used by militaries and disaster recovery tea...
Mansoor Alicherry, Angelos D. Keromytis
ACNS
2011
Springer
241views Cryptology» more  ACNS 2011»
12 years 11 months ago
Misuse Detection in Consent-Based Networks
Consent-based networking, which requires senders to have permission to send traffic, can protect against multiple attacks on the network. Highly dynamic networks like Mobile Ad-hoc...
Mansoor Alicherry, Angelos D. Keromytis