Sciweavers

2691 search results - page 380 / 539
» Security in Ad Hoc Networks
Sort
View
SIGCOMM
2009
ACM
14 years 4 months ago
MobiClique: middleware for mobile social networking
We consider a mobile ad hoc network setting where Bluetooth enabled mobile devices communicate directly with other devices as they meet opportunistically. We design and implement ...
Anna Kaisa Pietiläinen, Earl Oliver, Jason Le...
ICDCSW
2007
IEEE
14 years 4 months ago
Simulation and Analysis of Extended Brake Lights for Inter-Vehicle Communication Networks
— The goal of this research is to simulate and analyze an Inter-Vehicle Communication (IVC) Mobile Ad hoc Network (MANET). Automobiles of the future will take advantage of IVC ca...
Jason D. Watson, Mark Pellerito, Charlie Gladden, ...
WCNC
2008
IEEE
14 years 4 months ago
Performance Evaluation of Vehicular DTN Routing under Realistic Mobility Models
—In performance studies of vehicular ad hoc networks (VANETs), the underlying mobility model plays an important role. Since conventional mobile ad hoc network (MANET) routing pro...
Pei'en Luo, Hongyu Huang, Wei Shu, Minglu Li, Min-...
LCN
2005
IEEE
14 years 3 months ago
MAPNaS: A Lightweight, Locality-Aware Peer-to-Peer Based Name Service for MANETs
Name services for mobile ad hoc networks are essential to discover and bind resources given by their name or URI to a specific network address. As there is no fixed infrastructure...
Thomas Zahn, Jochen H. Schiller
SODA
2003
ACM
122views Algorithms» more  SODA 2003»
13 years 11 months ago
Fast distributed algorithms for (weakly) connected dominating sets and linear-size skeletons
Motivated by routing issues in ad hoc networks, we present polylogarithmic-time distributed algorithms for two problems. Given a network, we first show how to compute connected a...
Devdatt P. Dubhashi, Alessandro Mei, Alessandro Pa...