Sciweavers

1540 search results - page 44 / 308
» Self-Configuring and Optimizing Mobile Ad Hoc Networks
Sort
View
ESAS
2004
Springer
14 years 2 months ago
Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH
In this paper we describe the advantages of using iterative Diffie-Hellman (IDH) key trees for mobile ad-hoc group communication. We focus on the Treebased Group Diffie-Hellman (...
Mark Manulis, Jörg Schwenk
CORR
2010
Springer
117views Education» more  CORR 2010»
13 years 9 months ago
Node Disjoint Multipath Routing Considering Link and Node Stability protocol: A characteristic Evaluation
Mobile Ad hoc Networks are highly dynamic networks. Quality of Service (QoS) routing in such networks is usually limited by the network breakage due to either node mobility or ene...
Shuchita Upadhayaya, Charu Gandhi
TMC
2010
193views more  TMC 2010»
13 years 7 months ago
Quantifying Impact of Mobility on Data Availability in Mobile Ad Hoc Networks
—In mobile ad hoc networks, there are many applications in which mobile users share information, e.g., collaborative rescue operations at a disaster site and exchange of word-of-...
Takahiro Hara
ICDE
2010
IEEE
185views Database» more  ICDE 2010»
14 years 4 months ago
A tuple space for social networking on mobile phones
Abstract— Social networking is increasingly becoming a popular means of communication for online users. The trend is also true for offline scenarios where people use their mobil...
Emre Sarigöl, Oriana Riva, Gustavo Alonso
ICDCSW
2003
IEEE
14 years 2 months ago
Foundations of Security for Hash Chains in Ad Hoc Networks
Nodes in ad hoc networks generally transmit data at regular intervals over long periods of time. Recently, ad hoc network nodes have been built that run on little power and have v...
Phillip G. Bradford, Olga V. Gavrylyako