Sciweavers

2691 search results - page 422 / 539
» Security in Ad Hoc Networks
Sort
View
INTERSENSE
2006
ACM
14 years 4 months ago
Particle-based methodology for representing mobile ad-hoc networks
—We present a methodology based on physics laws and particles in order to represent, simulate, and architect advanced networking models. We introduce a mathematical formalism wit...
Carlos J. Martinez, Marisa López, Luis C. E...
AINA
2009
IEEE
14 years 5 months ago
Opportunistic Routing for Disruption Tolerant Networks
—Opportunistic networks represent one of the most interesting evolution of MANET paradigm. Generally speaking, opportunistic networks enable user communication in environments wh...
Marcello Caleffi, Luigi Paura
ICNP
2003
IEEE
14 years 3 months ago
Distributed, Self-Stabilizing Placement of Replicated Resources in Emerging Networks
Emerging large scale distributed networking systems, such as P2P file sharing systems, sensor networks, and ad hoc wireless networks, require replication of content, functionalit...
Bong-Jun Ko, Dan Rubenstein
IWAN
1999
Springer
14 years 2 months ago
The Impact of Active Networks on Established Network Operators
A collaborative case based study has established that Active Networks will have a very significant impact on Network operators. Active Networking appears to be the only route to a...
Arto Juhola, Ian Marshall, Stefan Covaci, Thomas V...
MOBIQUITOUS
2008
IEEE
14 years 4 months ago
Context-aware fault tolerance in migratory services
Mobile ad hoc networks can be leveraged to provide ubiquitous services capable of acquiring, processing, and sharing real-time information from the physical world. Unlike Internet...
Oriana Riva, Josiane Nzouonta, Cristian Borcea