Sciweavers

804 search results - page 140 / 161
» Limited flooding protocol for mobile ad hoc networks
Sort
View
GLOBECOM
2008
IEEE
14 years 3 months ago
A Novel Coalitional Game Model for Security Issues in Wireless Networks
—In this paper, we propose a novel coalitional game model for security issues in wireless networks. The model can be applied to not only mobile ad hoc networks but also wireless ...
Xiaoqi Li, Michael R. Lyu
MIDDLEWARE
2004
Springer
14 years 2 months ago
Kernel-middleware interaction to support adaptation in pervasive computing environments
In pervasive computing environments, conditions are highly variable and resources are limited. In order to meet the needs of applications, systems must adapt dynamically to changi...
Farshad A. Samimi, Philip K. McKinley, Seyed Masou...
NETGAMES
2003
ACM
14 years 2 months ago
Experiences using a dual wireless technology infrastructure to support ad-hoc multiplayer games
Multiplayer games for mobile wireless devices are becoming increasingly popular. Many modern devices such as PDAs or mobile telephones are equipped with Bluetooth interfaces. Blue...
Hartmut Ritter, Thiemo Voigt, Min Tian, Jochen H. ...
AINTEC
2007
Springer
14 years 3 months ago
A Real-Time Performance-Monitoring Tool for Emergency Networks
Abstract. Emergency networks normally operate under highly unpredictable wireless environment and hence real time performance information holds a great significance that cannot be...
Shuprabha Shakya, Mohammad Abdul Awal, Dwijendra K...
CORR
2007
Springer
156views Education» more  CORR 2007»
13 years 9 months ago
Analysis of a Mixed Strategy for Multiple Relay Networks
Abstract— Infrastructure based wireless communications systems as well as ad hoc networks experience a growing importance in present-day telecommunications. An increased density ...
Peter Rost, Gerhard Fettweis