Sciweavers

2691 search results - page 394 / 539
» Security in Ad Hoc Networks
Sort
View
BROADNETS
2007
IEEE
14 years 4 months ago
Practical time synchronization for Bluetooth Scatternets
Abstract— By means of so-called Scatternets, Bluetooth provides the ability to construct robust wireless multi-hop networks. In this paper we propose a practical protocol for tim...
Matthias Ringwald, Kay Römer
IJAHUC
2008
80views more  IJAHUC 2008»
13 years 10 months ago
Performance evaluation of node density-based adaptive routing scheme for disruption tolerant networks
: Traditional ad hoc routing protocols do not work in intermittently connected networks since end-to-end paths may not exist in such networks. Hence, routing mechanisms that can wi...
Mooi Choo Chuah, Peng Yang
DIALM
2004
ACM
124views Algorithms» more  DIALM 2004»
14 years 3 months ago
Localized techniques for broadcasting in wireless sensor networks
We present three localized techniques for broadcasting in large scale ad hoc networks, i.e., for the problem of disseminating a message from a source node to all the nodes in the ...
Lorenzo Orecchia, Alessandro Panconesi, Chiara Pet...
ECS
2006
89views more  ECS 2006»
13 years 10 months ago
Dynamic Decision Protocol For Adhoc Network
Several researches were conducted to Ad Hoc networks because of their facility of deployment, no need of an infrastructure and many other features. Thus, they still present many un...
Mohamed Ben Othman
ICECCS
2005
IEEE
92views Hardware» more  ICECCS 2005»
14 years 3 months ago
Secure Software Architectures Design by Aspect Orientation
Security design at architecture level is critical to achieve high assurance software systems. However, most security design techniques for software architectures were in ad hoc fa...
Huiqun Yu, Dongmei Liu, Xudong He, Li Yang, Shu Ga...