Sciweavers

851 search results - page 127 / 171
» Secure Mobile Agents on Ad Hoc Wireless Networks
Sort
View
EWSN
2006
Springer
14 years 8 months ago
Constrained Tracking on a Road Network
Many applications of wireless ad hoc sensor and actuator networks (WSANs) rely on the knowledge of node locations. These are challenging to obtain when nodes are mobile and are not...
Matthias Grossglauser, Michal Piórkowski
ECUMN
2007
Springer
14 years 2 months ago
Modeling and Analysis of Energy Consumption in IEEE802.11e Networks
Energy is a major concern in wireless networks, be it for the target mobile user, as is the case of IEEE802.11 Infrastructure mode, or for all the users as in IEEE802.11 ad hoc mo...
Olfa Bouattay, Tijani Chahed, Mounir Frikha, Sami ...
SASN
2005
ACM
14 years 2 months ago
On the security of group communication schemes based on symmetric key cryptosystems
Many emerging applications in both wired and wireless networks, such as information dissemination and distributed collaboration in an adversarial environment, need support of secu...
Shouhuai Xu
CORR
2008
Springer
107views Education» more  CORR 2008»
13 years 8 months ago
Modeling Spatial and Temporal Dependencies of User Mobility in Wireless Mobile Networks
Abstract--Realistic mobility models are fundamental to evaluate the performance of protocols in mobile ad hoc networks. Unfortunately, there are no mobility models that capture the...
Wei-jen Hsu, Thrasyvoulos Spyropoulos, Konstantino...
PERCOM
2006
ACM
14 years 8 months ago
Resource Allocation in Wireless Networks Using Directional Antennas
With the continued increase of speed and capacities of computing devices and the growing needs of people for mobile computing capabilities, Mobile ad hoc networks (MANETs) have gai...
Imad Jawhar, Jie Wu