Sciweavers

1030 search results - page 109 / 206
» Protocols Using Anonymous Connections: Mobile Applications
Sort
View
IJNM
2008
112views more  IJNM 2008»
15 years 4 months ago
How to avoid packet droppers with proactive routing protocols for ad hoc networks
Routing protocols for mobile ad hoc networks (MANETs) have been an active area of research for the last decade, with many very interesting potential as well as actual applications...
Ignacy Gawedzki, Khaldoun Al Agha
156
Voted
ESAS
2005
Springer
15 years 9 months ago
SKiMPy: A Simple Key Management Protocol for MANETs in Emergency and Rescue Operations
Mobile ad-hoc networks (MANETs) provide the technical platform for efficient information sharing in emergency and rescue operations. Some the data present on the scene is highly c...
Matija Puzar, Jon Andersson, Thomas Plagemann, Yve...
ISOLA
2010
Springer
15 years 2 months ago
Towards an Architecture for Runtime Interoperability
Abstract. Interoperability remains a fundamental challenge when connecting heterogeneous systems which encounter and spontaneously communicate with one another in pervasive computi...
Amel Bennaceur, Gordon S. Blair, Franck Chauvel, G...
EUC
2005
Springer
15 years 9 months ago
PULSE: A MAC Protocol for RFID Networks
1 The reader collision problem occurs when the signal from one reader interferes with the signal from other readers. Solutions like RTS-CTS are not applicable because a reader may ...
Shailesh M. Birari, Sridhar Iyer
ITIIS
2010
154views more  ITIIS 2010»
14 years 11 months ago
Research on Anti-Reader Collision Protocols for Integrated RFID-WSNs
Integrated RFID-WSNs (wireless sensor networks) have recently been researched to provide object identities, sensing information, mobile service, and network functionalities. In in...
Doohyun Ko, Bumjin Kim, Sunshin An