Sciweavers

447 search results - page 39 / 90
» Mobile Secret Key Distribution with Network Coding
Sort
View
ADHOC
2007
169views more  ADHOC 2007»
13 years 7 months ago
Ensuring strong data guarantees in highly mobile ad hoc networks via quorum systems
Ensuring the consistency and the availability of replicated data in highly mobile ad hoc networks is a challenging task because of the lack of a backbone infrastructure. Previous ...
Daniela Tulone
KIVS
2005
Springer
14 years 1 months ago
Making Chord go mobile
: The Chord protocol is a structured Peer-to-Peer (P2P) protocol based on distributed hash tables (DHT). By using hash keys to identify the nodes in the network and also the shared...
Stefan Zöls, Rüdiger Schollmeier, Wolfga...
FTDCS
1999
IEEE
13 years 12 months ago
PODC: Paradigm-Oriented Distributed Computing
We describe an environment for distributed computing that uses the concept of well-known paradigms. The main advantage of paradigmoriented distributed computing (PODC) is that the...
Hairong Kuang, Lubomir Bic, Michael B. Dillencourt...
CORR
2011
Springer
199views Education» more  CORR 2011»
12 years 11 months ago
STiCMAC: A MAC Protocol for Robust Space-Time Coding in Cooperative Wireless LANs
Relay-assisted cooperative wireless communication has been shown to have significant performance gains over the legacy direct transmission scheme. Compared with single relay base...
Pei Liu, Chun Nie, Thanasis Korakis, Elza Erkip, S...
MOBIWAC
2009
ACM
14 years 2 months ago
The sociable traveller: human travelling patterns in social-based mobility
Understanding how humans move is a key factor for the design and evaluation of networking protocols and mobility management solutions in mobile networks. This is particularly true...
Chiara Boldrini, Marco Conti, Andrea Passarella