Sciweavers

851 search results - page 45 / 171
» Secure Mobile Agents on Ad Hoc Wireless Networks
Sort
View
INFOCOM
2010
IEEE
13 years 7 months ago
Throughput, Delay, and Mobility in Wireless Ad Hoc Networks
—Throughput capacity in wireless ad hoc networks has been studied extensively under many different mobility models such as i.i.d. mobility model, Brownian mobility model, random ...
Pan Li, Yuguang Fang, Jie Li
PERVASIVE
2004
Springer
14 years 2 months ago
A Fault-Tolerant Key-Distribution Scheme for Securing Wireless Ad Hoc Networks
We propose a novel solution for securing wireless ad-hoc networks. Our goal is to provide secure key exchange in the presence of device failures and denial-of-service attacks. The ...
Arno Wacker, Timo Heiber, Holger Cermann, Pedro Jo...
MUM
2006
ACM
181views Multimedia» more  MUM 2006»
14 years 2 months ago
Cross-layer design for providing service oriented architecture in a mobile Ad Hoc network
This paper presents a novel cross-layer design for providing service oriented architecture (SOA) in a mobile ad hoc network (MANET). In the design SOA service discovery is integra...
Tommi Halonen, Timo Ojala
IJHPCN
2006
114views more  IJHPCN 2006»
13 years 9 months ago
Improved schemes for power-efficient broadcast in ad hoc networks
: Ad hoc wireless networks are a special type of wireless network in which a collection of mobile hosts (nodes) with wireless network interfaces may form a temporary network withou...
Xiao Chen, Jian Shen
ASE
2005
96views more  ASE 2005»
13 years 8 months ago
A Termination Detection Protocol for Use in Mobile Ad Hoc Networks
As devices become smaller and wireless networking technologies improve, the popularity of mobile computing continues to rise. In today's world, many consider devices such as c...
Gruia-Catalin Roman, Jamie Payton