Sciweavers

986 search results - page 96 / 198
» On fault tolerant ad hoc network design
Sort
View
ADHOCNOW
2006
Springer
14 years 4 months ago
Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks
Recently, identity-based cryptographic (IBC) schemes have been considered to secure mobile ad hoc networks (MANETs) due to their efficient key management properties. However, propo...
Katrin Hoeper, Guang Gong
ICPP
2005
IEEE
14 years 4 months ago
Connected k-Hop Clustering in Ad Hoc Networks
In wireless ad hoc networks, clustering is one of the most important approaches for many applications. A connected k-hop clustering network is formed by electing clusterheads in k...
Shuhui Yang, Jie Wu, Jiannong Cao
GLOBECOM
2009
IEEE
13 years 8 months ago
Secure Unified Cellular Ad Hoc Network Routing
Abstract--Previous simulations have shown substantial performance gains can be achieved by using hybrid cellular and wireless LAN (WLAN) approaches [1]. In a hybrid system, a proxy...
Jason J. Haas, Yih-Chun Hu
SAC
2005
ACM
14 years 3 months ago
Adaptive and fault tolerant medical vest for life-critical medical monitoring
In recent years, exciting technological advances have been made in development of flexible electronics. These technologies offer the opportunity to weave computation, communicat...
Roozbeh Jafari, Foad Dabiri, Philip Brisk, Majid S...
PERCOM
2006
ACM
14 years 4 months ago
A High-throughput MAC Protocol for Wireless Ad Hoc Networks
One way to improve the throughput of a wireless ad hoc network at the media access (MAC) layer is to allow concurrent transmission among neighboring nodes as much as possible. In ...
Wanrong Yu, Jiannong Cao, Xingming Zhou, Xiaodong ...