Sciweavers

1380 search results - page 107 / 276
» On Mobility-Capacity-Delay Trade-off in Wireless Ad Hoc Netw...
Sort
View
SASN
2003
ACM
14 years 1 months ago
Modeling vulnerabilities of ad hoc routing protocols
The purpose of this work is to automate the analysis of ad hoc routing protocols in the presence of attackers. To this end, a formal model of protocol behavior is developed in whi...
Shahan Yang, John S. Baras
MWCN
2004
Springer
14 years 1 months ago
On Selecting Nodes to Improve Estimated Positions
— We consider node localization problems in ad hoc wireless networks in which two types of nodes are considered: nodes with self-locating capability like GPS and nodes with no se...
Erwan Ermel, Anne Fladenmuller, Guy Pujolle, Andr&...
IFIP
2004
Springer
14 years 1 months ago
Activity-Based User Modeling in Service-Oriented Ad-Hoc-Networks
Wireless network research still lacks methods to integratively evaluate the performance that can be expected from application layer protocols. The user behavior is predominantly aï...
Tobias Breyer, Michael Klein, Philipp Obreiter, Bi...
MONET
2007
194views more  MONET 2007»
13 years 7 months ago
Pervasive Healthcare and Wireless Health Monitoring
With an increasingly mobile society and the worldwide deployment of mobile and wireless networks, the wireless infrastructure can support many current and emerging healthcare appli...
Upkar Varshney
CORR
2010
Springer
176views Education» more  CORR 2010»
13 years 8 months ago
Emergency Response Communications and Associated Security Challenges
The natural or man-made disaster demands an efficient communication and coordination among first responders to save life and other community resources. Normally, the traditional c...
Muhammad Ibrahim Channa, Kazi M. Ahmed