Sciweavers

1373 search results - page 221 / 275
» Self-securing ad hoc wireless networks
Sort
View
ICALT
2008
IEEE
14 years 3 months ago
A Pervasive Assessment System: Extending QTI to Incorporate Ad-hoc Wireless Sensors
Ad-hoc sensor networks provide a cheap and scalable technology for constructing pervasive learning assessment systems that are embedded in physical environments. This paper propos...
Imran A. Zualkernan, Ahmed Wasfy, Imad Zabalawi, M...
COMSWARE
2006
IEEE
14 years 16 days ago
M2MC: Middleware for many to many communication over broadcast networks
M2MC is a new distributed computing middleware designed to support collaborative applications running on devices connected by broadcast networks. Examples of such networks are wire...
Chaitanya Krishna Bhavanasi, Sridhar Iyer
WINET
2008
100views more  WINET 2008»
13 years 8 months ago
SOLONet: Sub-optimal location-aided overlay network for MANETs
Overlay networks have made it easy to implement multicast functionality in wireless ad hoc networks. Their flexibility to adapt to different environments has helped in their stead...
Abhishek P. Patil, Yunhao Liu, Li Xiao, Abdol-Hoss...
IWCMC
2006
ACM
14 years 2 months ago
TARP: trust-aware routing protocol
Security is a critical issue in a mobile ad hoc network (MANET). In most of the previous protocols security is an added layer above the routing protocol. We propose a TrustAware R...
Loay Abusalah, Ashfaq A. Khokhar, G. BenBrahim, W....
INFOCOM
2011
IEEE
13 years 7 days ago
Clustering in cooperative networks
Abstract—Low power ad hoc wireless networks operate in conditions where channels are subject to fading. Cooperative diversity mitigates fading in these networks by establishing v...
Boulat A. Bash, Dennis Goeckel, Donald F. Towsley