Sciweavers

2691 search results - page 441 / 539
» Security in Ad Hoc Networks
Sort
View
IWCMC
2009
ACM
14 years 2 months ago
Scheduling cooperative emergency response: or how the meek shall overcome the greedy
We consider the problem of scheduling emergency responders to geospatially located finite duration temporally bounded tasks. We consider two different schedulers, Greedy and Mee...
Carol Dottin, Bilal Khan
WCNC
2010
IEEE
14 years 1 months ago
META: A Mobility Model of MEtropolitan TAxis Extracted from GPS Traces
In this paper, we present our study of extracting a mobility model for vehicular ad hoc networks (VANETs) from a large amount of real taxi GPS trace data. In order to capture char...
Hongyu Huang, Yanmin Zhu, Xu Li, Minglu Li, Min-Yo...
AICT
2006
IEEE
102views Communications» more  AICT 2006»
14 years 1 days ago
Publishing, Retrieving and Streaming Lectures via Application Level Multicast
Structured peer-to-peer overlay network is an efficient solution for querying and retrieving resources spread between the peers. Unfortunately, key based routing of Distributed Ha...
Marco Milanesio, Giancarlo Ruffo
PE
2007
Springer
112views Optimization» more  PE 2007»
13 years 9 months ago
Design and analysis of adaptive strategies for locating internet-based servers in MANETs
A critical problem in providing Internet access to Mobile Ad Hoc Networks (MANETs) is how the mobile hosts can locate Internet-based servers efficiently in a dynamic, unstructure...
Hongbo Jiang, Shudong Jin
CASES
2005
ACM
14 years 17 hour ago
Software-directed power-aware interconnection networks
Interconnection networks have been deployed as the communication fabric in a wide range of parallel computer systems. With recent technological trends allowing growing quantities ...
Vassos Soteriou, Noel Eisley, Li-Shiuan Peh