Sciweavers

775 search results - page 72 / 155
» Secure Service Provision in Ad Hoc Networks
Sort
View
ADHOCNOW
2003
Springer
14 years 4 months ago
Resisting Malicious Packet Dropping in Wireless Ad Hoc Networks
Most of the routing protocols in wireless ad hoc networks, such as DSR, assume nodes are trustworthy and cooperative. This assumption renders wireless ad hoc networks vulnerable to...
Mike Just, Evangelos Kranakis, Tao Wan
MOBICOM
2003
ACM
14 years 4 months ago
Manycast: exploring the space between anycast and multicast in ad hoc networks
The characteristics of ad hoc networks naturally encourage the deployment of distributed services. Although current networks implement group communication methods, they do not sup...
Casey Carter, Seung Yi, Prashant Ratanchandani, Ro...
SOCA
2007
IEEE
14 years 5 months ago
Negotiating Agreements Using Policies in Ubiquitous Computing Scenarios
The emerging ubiquitous computing vision is characterized by decentralized and ad hoc interoperation among devices and networks for access to services. Interacting devices or grou...
Venkatraman Ramakrishna, Kevin Eustice, Peter L. R...
MOBIQUITOUS
2005
IEEE
14 years 4 months ago
Multi-path Admission Control for Mobile Ad hoc Networks
As wireless networks become more prevalent, users will demand the same applications that are currently available in wired networks. Further, they will expect to receive a quality ...
Anders Lindgren, Elizabeth M. Belding-Royer
MATA
2005
Springer
192views Communications» more  MATA 2005»
14 years 4 months ago
A Cross-Layer Approach for Publish/Subscribe in Mobile Ad Hoc Networks
Abstract. In the context of ubiquitous and pervasive computing, publish/subscribe middleware is gaining momentum due to its loosely coupled communication scheme. In this paper we p...
Marco Avvenuti, Alessio Vecchio, Giovanni Turi