Sciweavers

1540 search results - page 88 / 308
» Self-Configuring and Optimizing Mobile Ad Hoc Networks
Sort
View
WS
2003
ACM
14 years 2 months ago
Secure data transmission in mobile ad hoc networks
The vision of nomadic computing with its ubiquitous access has stimulated much interest in the Mobile Ad Hoc Networking (MANET) technology. However, its proliferation strongly dep...
Panagiotis Papadimitratos, Zygmunt J. Haas
CSREASAM
2008
13 years 10 months ago
Secure Resource Sharing in Ad hoc Networks
Abstract Mobile and wireless devices become more popular and their capabilities increase as well. At the same time, most of the today's PC power is unused, as a study of the G...
Michaela Greiler, Peter Schartner
WS
2005
ACM
14 years 2 months ago
Fully self-organized peer-to-peer key management for mobile ad hoc networks
Mobile ad hoc networks (MANETs) offer communication over a shared wireless channel without any pre-existing infrastructure. Forming peer-to-peer security associations in MANETs i...
Johann van der Merwe, Dawoud S. Dawoud, Stephen Mc...
MOBIHOC
2001
ACM
14 years 8 months ago
Time synchronization in ad hoc networks
Ubiquitous computing environments are typically based upon ad hoc networks of mobile computing devices. These devices may be equipped with sensor hardware to sense the physical en...
Kay Römer
NCA
2005
IEEE
14 years 2 months ago
Providing Hard Real-Time Guarantees in Context-Aware Applications: Challenges and Requirements
Context-aware applications rely on the ability to perceive the state of the surrounding environment. In this paper, we address a class of such applications where real-time guarant...
Malika Boulkenafed, Barbara Hughes, René Me...