Sciweavers

2691 search results - page 472 / 539
» Security in Ad Hoc Networks
Sort
View
SIGCOMM
2004
ACM
14 years 3 months ago
Comparison of routing metrics for static multi-hop wireless networks
Routing protocols for wireless ad hoc networks have traditionally focused on finding paths with minimum hop count. However, such paths can include slow or lossy links, leading to...
Richard Draves, Jitendra Padhye, Brian Zill
ICNP
2003
IEEE
14 years 3 months ago
Mobile Distributed Information Retrieval for Highly-Partitioned Networks
We propose and evaluate a mobile, peer-to-peer Information Retrieval system. Such a system can, for example, support medical care in a disaster by allowing access to a large colle...
Katrina M. Hanna, Brian Neil Levine, R. Manmatha
ICRA
2003
IEEE
133views Robotics» more  ICRA 2003»
14 years 3 months ago
Connectivity-through-time protocols for dynamic wireless networks to support mobile robot teams
—Mobile robot teams are increasingly deployed in various applications involving remote operations in unstructured environments that do not support wireless network infrastructure...
Nageswara S. V. Rao, Qishi Wu, S. Sitharama Iyenga...
SAC
2009
ACM
14 years 2 months ago
Autonomous networked robots for the establishment of wireless communication in uncertain emergency response scenarios
During a disaster, emergency response operations can benefit from the establishment of a wireless ad hoc network. We propose the use of autonomous robots that move inside a disas...
Stelios Timotheou, Georgios Loukas
ISSTA
2000
ACM
14 years 2 months ago
Verisim: Formal analysis of network simulations
—Network protocols are often analyzed using simulations. We demonstrate how to extend such simulations to check propositions expressing safety properties of network event traces ...
Karthikeyan Bhargavan, Carl A. Gunter, Moonjoo Kim...