Sciweavers

2691 search results - page 382 / 539
» Security in Ad Hoc Networks
Sort
View
EWSN
2006
Springer
14 years 10 months ago
Constrained Tracking on a Road Network
Many applications of wireless ad hoc sensor and actuator networks (WSANs) rely on the knowledge of node locations. These are challenging to obtain when nodes are mobile and are not...
Matthias Grossglauser, Michal Piórkowski
ECUMN
2007
Springer
14 years 4 months ago
Modeling and Analysis of Energy Consumption in IEEE802.11e Networks
Energy is a major concern in wireless networks, be it for the target mobile user, as is the case of IEEE802.11 Infrastructure mode, or for all the users as in IEEE802.11 ad hoc mo...
Olfa Bouattay, Tijani Chahed, Mounir Frikha, Sami ...
IPPS
2006
IEEE
14 years 4 months ago
Similarity-aware query processing in sensor networks
We assume a sensor network with data-centric storage, where sensor data is stored within the sensor network and ad hoc queries are disseminated and processed inside the network. I...
Ping Xia, Panos K. Chrysanthis, Alexandros Labrini...
INTERSENSE
2006
ACM
14 years 4 months ago
A context-aware middleware platform for autonomous application services in dynamic wireless networks
— Dynamic wireless networks, and especially mobile ad hoc networks, impose new constraints regarding the design and the implementation of service-oriented middleware platforms de...
Nicolas Le Sommer, Frédéric Guidec, ...
COLCOM
2007
IEEE
14 years 4 months ago
Peer2Schedule - an experimental peer-to-peer application to support present collaboration
Abstract—This paper describes experiences from implementing an experimental mobile peer-to-peer application called Peer2Schedule aimed at improving and supporting collaboration w...
Alf Inge Wang, Peter Nicolai Motzfeldt