Sciweavers

255 search results - page 47 / 51
» Non-interactive key establishment in mobile ad hoc networks
Sort
View
MOBIQUITOUS
2007
IEEE
14 years 1 months ago
On Improving Dynamic Source Routing for Intermittently Available Nodes in MANETs
—Previous work on routing in MANETs has resulted in numerous routing protocols that aim at satisfying constraints such as minimum hop or low energy. Existing routing protocols of...
Pramita Mitra, Christian Poellabauer, Shivajit Moh...
NETWORKING
2007
13 years 9 months ago
Interference-Aware Multicasting in Wireless Mesh Networks
Multicasting is one of the most important applications in Wireless Ad hoc Networks and the currently emerging Wireless Mesh Networks. In such networks, interference due to the shar...
Sudheendra Murthy, Abhishek Goswami, Arunabha Sen
ADHOC
2006
86views more  ADHOC 2006»
13 years 7 months ago
Energy considerations for topology-unaware TDMA MAC protocols
Since the energy budget of mobile nodes is limited, the performance of a networking protocol for such users should be evaluated in terms of its energy efficiency, in addition to t...
Konstantinos Oikonomou, Ioannis Stavrakakis
MIDDLEWARE
2004
Springer
14 years 25 days ago
Adaptive resource discovery for ubiquitous computing
The terms pervasive and ubiquitous computing are used to describe a smart space populated by hundreds of intelligent devices that are embedded in their surroundings. Characteristi...
Rae Harbird, Stephen Hailes, Cecilia Mascolo
ADHOC
2007
115views more  ADHOC 2007»
13 years 7 months ago
Modeling adaptive node capture attacks in multi-hop wireless networks
We investigate the problem of modeling node capture attacks in heterogeneous wireless ad hoc and mesh networks. Classical adversarial models such as the Dolev–Yao model are know...
Patrick Tague, Radha Poovendran