Sciweavers

2691 search results - page 383 / 539
» Security in Ad Hoc Networks
Sort
View
CORR
2011
Springer
205views Education» more  CORR 2011»
13 years 5 months ago
Random Walk on Directed Dynamic Graphs
Dynamic graphs have emerged as an appropriate model to capture the changing nature of many modern networks, such as peer-to-peer overlays and mobile ad hoc networks. Most of the re...
Oksana Denysyuk, Luis Rodrigues
EVOW
2009
Springer
14 years 5 months ago
Wireless Communications for Distributed Navigation in Robot Swarms
We consider a swarm of robots equipped with an infrared range and bearing device that is able both to make estimates of the relative distance and angle between two robots in line-o...
Gianni A. Di Caro, Frederick Ducatelle, Luca Maria...
ADHOCNOW
2006
Springer
14 years 4 months ago
Evaluation of the Energy Consumption in MANET
In ad hoc mobile wireless networks, energy consumption is an important issue as most mobile hosts operate on limited battery resources. Existing models for evaluating the energy co...
Géraud Allard, Pascale Minet, Dang-Quan Ngu...
INFOCOM
1997
IEEE
14 years 2 months ago
Investigation of the IEEE 802.11 Medium Access Control (MAC)
Analysis of the drafi IEEE 802.11 wireless local area network (WLAN) standard is needed to characterize the expected performance of the standard’s ad hoc and infrastructure netw...
Brian P. Crow, Indra Widjaja, Jeong Geun Kim, Pres...
AINA
2008
IEEE
14 years 4 months ago
Transparently Adding Security Properties to Service Orchestration
In this paper, we present a tool allowing the design of orchestration at a high level of abstraction. This tool also allows specifying security properties, also in an way, as anno...
Stéphanie Chollet, Philippe Lalanda, Andr&e...