Sciweavers

1337 search results - page 197 / 268
» Modeling Time-Variant User Mobility in Wireless Mobile Netwo...
Sort
View
111
Voted
WISEC
2009
ACM
15 years 10 months ago
An attacker model for MANET routing security
Mobile ad-hoc networks are becoming ever more popular due to their flexibility, low cost, and ease of deployment. However, to achieve these benefits the network must employ a so...
Jared Cordasco, Susanne Wetzel
ADHOCNOW
2004
Springer
15 years 8 months ago
Analysis of the Information Propagation Time Among Mobile Hosts
Consider k particles, 1 red and k −1 white, chasing each other on the nodes of a graph G. If the red one catches one of the white, it “infects” it with its color. The newly ...
Tassos Dimitriou, Sotiris E. Nikoletseas, Paul G. ...
140
Voted
DMSN
2008
ACM
15 years 5 months ago
Stream-based macro-programming of wireless sensor, actuator network applications with SOSNA
Wireless sensor, actuator networks (WSANs) distinguish themselves from wireless sensor networks by the need to coordinate actuators' actions, real-time constraints on communi...
Marcin Karpinski, Vinny Cahill
ISCC
2002
IEEE
147views Communications» more  ISCC 2002»
15 years 8 months ago
Self-securing ad hoc wireless networks
Mobile ad hoc networking offers convenient infrastructureless communication over the shared wireless channel. However, the nature of ad hoc networks makes them vulnerable to secur...
Haiyun Luo, Petros Zerfos, Jiejun Kong, Songwu Lu,...
MOBISYS
2010
ACM
15 years 5 months ago
Augmenting mobile 3G using WiFi
We investigate if WiFi access can be used to augment 3G capacity in mobile environments. We first conduct a detailed study of 3G and WiFi access from moving vehicles, in three dif...
Aruna Balasubramanian, Ratul Mahajan, Arun Venkata...