Sciweavers

566 search results - page 22 / 114
» Trust Establishment in Ad Hoc and Sensor Networks
Sort
View
CN
2007
172views more  CN 2007»
13 years 7 months ago
Threshold cryptography in P2P and MANETs: The case of access control
Ad hoc groups, such as peer-to-peer (P2P) systems and mobile ad hoc networks (MANETs) represent recent technological advancements. They support low-cost, scalable and fault-tolera...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
ADHOC
2008
183views more  ADHOC 2008»
13 years 7 months ago
On ant routing algorithms in ad hoc networks with critical connectivity
This paper shows a novel self-organizing approach for routing datagrams in ad hoc networks, called Distributed Ant Routing (DAR). This approach belongs to the class of routing alg...
Laura Rosati, Matteo Berioli, Gianluca Reali
SAC
2005
ACM
14 years 1 months ago
An adaptive TDMA slot assignment protocol in ad hoc sensor networks
Due to its ability to provide collision-free packet transmission regardless of the traffic load, TDMA (Time Division Multiple Access) has been applied in ad hoc sensor networks. W...
Akimitsu Kanzaki, Takahiro Hara, Shojiro Nishio
MOBIHOC
2001
ACM
14 years 7 months ago
Time synchronization in ad hoc networks
Ubiquitous computing environments are typically based upon ad hoc networks of mobile computing devices. These devices may be equipped with sensor hardware to sense the physical en...
Kay Römer
ARCS
2006
Springer
13 years 11 months ago
Background Data Acquisition and Carrying: The BlueDACS Project
As an alternative to ad hoc wireless sensor networks, we propose to utilize the mobile devices that are carried by people who walk along the site on which the sensors are deployed....
Thomas Wieland, Martin Fenne, Benjamin Stöcke...