Sciweavers

2691 search results - page 406 / 539
» Security in Ad Hoc Networks
Sort
View
SUTC
2006
IEEE
14 years 4 months ago
Protocol assessment issues in low duty cycle sensor networks: The switching energy
Energy assessment of MAC protocols for wireless sensor networks is generally based on the times of transmit, receive and sleep modes. The switching energy between two consecutive ...
Antonio G. Ruzzelli, Gregory M. P. O'Hare, Richard...
OTM
2004
Springer
14 years 3 months ago
Towards a Peer-to-Peer Event Broker Grid in a Hybrid Network Environment
Peer-to-peer networks and grids offer promising paradigms for developing efficient distributed systems and applications. Event-based middleware is becoming a core architectural el...
Eiko Yoneki, Jean Bacon
RAID
2010
Springer
13 years 8 months ago
Anomaly Detection and Mitigation for Disaster Area Networks
Abstract. One of the most challenging applications of wireless networking are in disaster area networks where lack of infrastructure, limited energy resources, need for common oper...
Jordi Cucurull, Mikael Asplund, Simin Nadjm-Tehran...
KIVS
2005
Springer
14 years 3 months ago
Epidemic Dissemination of Presence Information in Mobile Instant Messaging Systems
This paper presents an approach for exchanging presence information between users of an instant messaging system in a mobile ad hoc network. As major feature, presence information ...
Christoph Lindemann, Oliver P. Waldhorst
TRUSTBUS
2005
Springer
14 years 3 months ago
A Privacy Enhancement Mechanism for Location Based Service Architectures Using Transaction Pseudonyms
Abstract. Third party service providers are starting to use advanced location services based on area or periodical notification in order to develop innovative applications. Howeve...
Oliver Jorns, Oliver Jung, Julia Gross, Sandford B...