Sciweavers

2691 search results - page 535 / 539
» Security in Ad Hoc Networks
Sort
View
CORR
2011
Springer
171views Education» more  CORR 2011»
13 years 4 months ago
Fairness issues in a chain of IEEE 802.11 stations
: We study a simple general scenario of ad hoc networks based on IEEE 802.11 wireless communications, consisting in a chain of transmitters, each of them being in the carrier sense...
Bertrand Ducourthial, Yacine Khaled, Stépha...
EUC
2007
Springer
14 years 4 months ago
A Selective Push Algorithm for Cooperative Cache Consistency Maintenance over MANETs
Cooperative caching is an important technique to support efficient data dissemination and sharing in Mobile Ad hoc Networks (MANETs). In order to ensure valid data access, the cach...
Yu Huang 0002, Beihong Jin, Jiannong Cao, Guangzho...
MSWIM
2005
ACM
14 years 3 months ago
Topology control with better radio models: implications for energy and multi-hop interference
Topology Control (TC) is a well-studied technique used in wireless ad hoc networks to find energy-efficient and/or low-interference subgraphs of the maxpower communication graph....
Douglas M. Blough, Mauro Leoncini, Giovanni Resta,...
HICSS
2003
IEEE
160views Biometrics» more  HICSS 2003»
14 years 3 months ago
Context-Awareness on Mobile Devices - the Hydrogen Approach
Information about the user's environment offers new opportunities and exposes new challenges in terms of time-aware, location-aware, device-aware and personalized application...
Thomas Hofer, Wieland Schwinger, Mario Pichler, Ge...
ADHOC
2006
86views more  ADHOC 2006»
13 years 9 months ago
Energy considerations for topology-unaware TDMA MAC protocols
Since the energy budget of mobile nodes is limited, the performance of a networking protocol for such users should be evaluated in terms of its energy efficiency, in addition to t...
Konstantinos Oikonomou, Ioannis Stavrakakis