Sciweavers

1455 search results - page 220 / 291
» Policy-Based Mobile Ad Hoc Network Management
Sort
View
HCI
2007
13 years 10 months ago
Mobile Social Software for the Developing World
This paper discusses how the importance of social networks for performing everyday tasks in the developing world leads to new considerations of the utility of social networking sof...
Beth E. Kolko, Erica J. Johnson, Emma J. Rose
CUZA
2002
129views more  CUZA 2002»
13 years 8 months ago
Ad Hoc Metacomputing with Compeer
Metacomputing allows the exploitation of geographically seperate, heterogenous networks and resources. Most metacomputers are feature rich and carry a long, complicated installati...
Keith Power, John P. Morrison
ANSS
2008
IEEE
14 years 3 months ago
A Simulation Study of Common Mobility Models for Opportunistic Networks
Understanding mobility characteristics is important for the design and analysis of routing schemes for mobile ad hoc networks (MANETs). This is especially true for mobile opportun...
Muhammad Abdulla, Robert Simon
FC
2007
Springer
125views Cryptology» more  FC 2007»
14 years 3 months ago
Scalable Authenticated Tree Based Group Key Exchange for Ad-Hoc Groups
Task-specific groups are often formed in an ad-hoc manner within big structures, like companies. Take the following typical scenario: A high rank manager decides that a task force...
Yvo Desmedt, Tanja Lange, Mike Burmester
OTM
2009
Springer
14 years 3 months ago
An Architecture for Dynamic Trust Monitoring in Mobile Networks
Collusion attacks remain a major problem of reputation and trust models, in mobile ad hoc networks. By covering up malicious behaviour of one another from the remaining part of the...
Olufunmilola Onolaja, Rami Bahsoon, Georgios Theod...