Sciweavers

1030 search results - page 128 / 206
» Protocols Using Anonymous Connections: Mobile Applications
Sort
View
109
Voted
WIS
2004
15 years 5 months ago
Auctions in mobile multihop ad-hoc networks following the marketplace communication pattern
This paper presents UbiBay, a self-organizing distributed auction system using a mobile multihop ad-hoc network as its sole communication platform. In order to substantially increa...
Hannes Frey, Daniel Görgen, Johannes K. Lehne...
ISLPED
2003
ACM
197views Hardware» more  ISLPED 2003»
15 years 9 months ago
Analyzing the energy consumption of security protocols
Security is critical to a wide range of wireless data applications and services. While several security mechanisms and protocols have been developed in the context of the wired In...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
CORR
2010
Springer
175views Education» more  CORR 2010»
15 years 4 months ago
The Dynamics of Vehicular Networks in Urban Environments
Vehicular Ad hoc NETworks (VANETs) have emerged as a platform to support intelligent inter-vehicle communication and improve traffic safety and performance. The road-constrained a...
Nicholas Loulloudes, George Pallis, Marios D. Dika...
ICPADS
2008
IEEE
15 years 10 months ago
Mobility-Assisted Position Estimation in Wireless Sensor Networks
Wireless sensor networks (WSNs) have been proposed for a multitude of location-dependent applications. To stamp the collected data and facilitate communication protocols, it is nec...
Hongyang Chen, Pei Huang, Hing-Cheung So, Kaoru Se...
ADHOC
2007
144views more  ADHOC 2007»
15 years 4 months ago
Adaptive gossip protocols: Managing security and redundancy in dense ad hoc networks
Abstract. Many ad hoc routing algorithms rely on broadcast flooding for location discovery or, more generally, for secure routing applications. Flooding is a robust algorithm but ...
Mike Burmester, Tri Van Le, Alec Yasinsac