Sciweavers

2684 search results - page 429 / 537
» On the Connectivity of Ad Hoc Networks
Sort
View
SAINT
2003
IEEE
14 years 1 months ago
Distributed Authentication for Peer-to-Peer Networks
A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Securi...
Shardul Gokhale, Partha Dasgupta
MMS
2007
13 years 9 months ago
An Experimental Frame for Evaluating Service Trading Overlays in Mobile ad-hoc Networks
Abstract: For evaluating dynamics of mobile ad-hoc networks at least three different layers have to be distinguished: the application layer, the protocol layer, and the network lay...
Mathias Röhl, Adelinde M. Uhrmacher, Birgitta...
PERCOM
2009
ACM
14 years 8 months ago
P2P over MANET: Indirect Tree-based Routing
Abstract--Mobile Ad hoc NETworks (MANET) and Peer-ToPeer (P2P) systems are emerging technologies sharing a common underlying decentralized networking paradigm. However, the related...
Marcello Caleffi, Luigi Paura
ICPADS
2008
IEEE
14 years 2 months ago
Query Management in a Sensor Environment
Traditional sensor network deployments consisted of fixed infrastructures and were relatively small in size. More and more, we see the deployment of ad-hoc sensor networks with h...
Martin F. O'Connor, Vincent Andrieu, Mark Roantree
DEXA
2008
Springer
98views Database» more  DEXA 2008»
13 years 10 months ago
REALM: Replication of Data for a Logical Group Based MANET Database
Abstract. Mobile Ad-Hoc Networks, or MANETs, provide communication between free-roaming mobile hosts without a fixed infrastructure. These MANETs operate under conditions of limite...
Anita Vallur, Le Gruenwald, Nick Hunter