Sciweavers

583 search results - page 97 / 117
» On Cooperative Wireless Network Secrecy
Sort
View
ICASSP
2011
IEEE
13 years 1 months ago
Predictive modeling of the spatiotemporal evolution of an environmental hazard and its sensor network implementation
Predicting accurately the spatiotemporal evolution of a diffusive environmental hazard is of paramount importance for its effective containment. We approximate the front line of a...
Dimitris V. Manatakis, Elias S. Manolakos
PERCOM
2005
ACM
14 years 9 months ago
Mobile Chedar - A Peer-to-Peer Middleware for Mobile Devices
This paper presents the Mobile Chedar Peer-to-Peer middleware for mobile peer-to-peer applications. The middleware is an extension to the Chedar peer-to-peer network allowing mobi...
Niko Kotilainen, Matthieu Weber, Mikko Vapa, Juori...
APCSAC
2003
IEEE
14 years 3 months ago
A Router Architecture to Achieve Link Rate Throughput in Suburban Ad-hoc Networks
Static nodes, e.g. houses, educational institutions etc, can comprise ad-hoc networks using off-the-self wireless technologies with a view to bypass expensive telecommunication so...
Muhammad Mahmudul Islam, Ronald Pose, Carlo Kopp
CCR
2004
120views more  CCR 2004»
13 years 9 months ago
MAC-layer anycasting in ad hoc networks
A wireless ad hoc network is formed by a group of wireless hosts, without the use of any infrastructure. To enable communication, hosts cooperate among themselves to forward packet...
Romit Roy Choudhury, Nitin H. Vaidya
CNSR
2004
IEEE
14 years 1 months ago
Trusted Route Discovery with TORA Protocol
An ad-hoc network is formed when a group of wireless nodes pledge to help each other in passing packets based upon a pre-agreed protocol. Temporally Ordered Routing Algorithm (TOR...
Asad Amir Pirzada, Chris McDonald