Sciweavers

662 search results - page 102 / 133
» Secure data transmission in mobile ad hoc networks
Sort
View
TMC
2008
83views more  TMC 2008»
13 years 8 months ago
A Swarm-Intelligence-Based Protocol for Data Acquisition in Networks with Mobile Sinks
This paper addresses the problem of data acquisition in ad hoc and sensor networks with mobile sinks and proposes a protocol based on swarm intelligence, SIMPLE, to route data in s...
Hua Yang, Fengji Ye, Biplab Sikdar
ESORICS
2000
Springer
14 years 13 days ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud
SAC
2004
ACM
14 years 2 months ago
An anonymous bonus point system for mobile commerce based on word-of-mouth recommendation
Next generation mobile devices will allow users to share and pass information within anonymous groups of people in an ad hoc manner. This will smooth the path for many kinds of ne...
Tobias Straub, Andreas Heinemann
PERCOM
2003
ACM
14 years 8 months ago
Using Peer-to-Peer Data Routing for Infrastructure-Based Wireless Networks
A mobile ad-hoc network is an autonomous system of mobile routers that are self-organizing and completely decentralized with no requirements for dedicated infrastructure support. ...
Sethuram Balaji Kodeswaran, Olga Ratsimore, Anupam...
INFOCOM
2010
IEEE
13 years 7 months ago
Distributed Opportunistic Scheduling for Ad-Hoc Communications Under Delay Constraints
—With the convergence of multimedia applications and wireless communications, there is an urgent need for developing new scheduling algorithms to support real-time traffic with ...
Sheu-Sheu Tan, Dong Zheng, Junshan Zhang, James R....