Sciweavers

745 search results - page 96 / 149
» Proxy-based security protocols in networked mobile devices
Sort
View
EVOW
2009
Springer
14 years 3 months ago
Wireless Communications for Distributed Navigation in Robot Swarms
We consider a swarm of robots equipped with an infrared range and bearing device that is able both to make estimates of the relative distance and angle between two robots in line-o...
Gianni A. Di Caro, Frederick Ducatelle, Luca Maria...
WS
2005
ACM
14 years 2 months ago
Fully self-organized peer-to-peer key management for mobile ad hoc networks
Mobile ad hoc networks (MANETs) offer communication over a shared wireless channel without any pre-existing infrastructure. Forming peer-to-peer security associations in MANETs i...
Johann van der Merwe, Dawoud S. Dawoud, Stephen Mc...
AINA
2007
IEEE
14 years 3 months ago
Power and Delay Analysis of The WEAC Protocol Based MANET Under Video Transport
Abstract— Transporting video over wireless networks has twofold constraints. Not only should it satisfy delay requirements but power minimization and QoS issues should be handled...
Hafiz M. Asif, Tarek R. Sheltami
SIGMETRICS
2000
ACM
217views Hardware» more  SIGMETRICS 2000»
13 years 8 months ago
Experimenting with an Ad Hoc wireless network on campus: insights and experiences
Ad hoc wireless networks are new communication networks that can be dynamically formed and deformed onthe- y, anytime and anywhere. User data is routed with the help of an ad hoc ...
Chai-Keong Toh, Richard Chen, Minar Delwar, Donald...
WIS
2004
13 years 10 months ago
Auctions in mobile multihop ad-hoc networks following the marketplace communication pattern
This paper presents UbiBay, a self-organizing distributed auction system using a mobile multihop ad-hoc network as its sole communication platform. In order to substantially increa...
Hannes Frey, Daniel Görgen, Johannes K. Lehne...