Sciweavers

2691 search results - page 426 / 539
» Security in Ad Hoc Networks
Sort
View
MIDDLEWARE
2005
Springer
14 years 3 months ago
Middleware for protocol-based coordination in dynamic networks
Pervasive and ad hoc computing applications are frequently deployed in dynamic networks. Due to mobility of the computing nodes, their unreliability, or a limited communication ra...
Kurt Schelfthout, Danny Weyns, Tom Holvoet
ADHOCNETS
2009
Springer
14 years 4 months ago
Enhancement of Self-organisation in Wireless Networking through a Cross-Layer Approach
Self-organisation has emerged as a very promising approach to the design, deployment, operation, control and evolution of complex wireless networks. The dominant strictly layered d...
Mohammad Abdur Razzaque, Simon A. Dobson, Paddy Ni...
ICASSP
2008
IEEE
14 years 4 months ago
NeSh: A joint shadowing model for links in a multi-hop network
Accurate analysis and simulation in multi-hop (sensor, ad hoc, and mesh) networks requires accurate representation of physical layer fading processes. Current models either ignore...
Neal Patwari, Piyush Agrawal
SECON
2008
IEEE
14 years 4 months ago
Immunity-Based Epidemic Routing in Intermittent Networks
– In this research, we propose to modify and extend epidemic routing used in intermittent networks. In particular, we propose to include immunity-based information disseminated i...
Padma Mundur, Matthew Seligman, Jin Na Lee
MMS
2007
13 years 11 months ago
An Experimental Frame for Evaluating Service Trading Overlays in Mobile ad-hoc Networks
Abstract: For evaluating dynamics of mobile ad-hoc networks at least three different layers have to be distinguished: the application layer, the protocol layer, and the network lay...
Mathias Röhl, Adelinde M. Uhrmacher, Birgitta...