Sciweavers

671 search results - page 102 / 135
» Trust evaluation in ad-hoc networks
Sort
View
EUC
2005
Springer
14 years 4 months ago
An Integrated Scheme for Address Assignment and Service Location in Pervasive Environments
We propose an efficient scheme called CoReS (Configuration and Registration Scheme) that integrates address assignment and service location for ad hoc networks prevalent in pervasi...
Mijeom Kim, Mohan Kumar, Behrooz Shirazi
INFOCOM
2007
IEEE
14 years 5 months ago
Geographic Routing Using Hyperbolic Space
Abstract— We propose a scalable and reliable point-topoint routing algorithm for ad hoc wireless networks and sensornets. Our algorithm assigns to each node of the network a virt...
Robert Kleinberg
ICPADS
2002
IEEE
14 years 3 months ago
The Impact of RTS Threshold on IEEE 802.11 MAC Protocol
Wireless technologies and applications received great attention in recent years. The medium access control (MAC) protocol is the main element that determines the efficiency in sha...
Shiann-Tsong Sheu, Tobias Chen, Jenhui Chen, Fun Y...
COORDINATION
2008
Springer
14 years 22 days ago
CiAN: A Workflow Engine for MANETs
Most mature workflow management systems (WfMSs) available today execute workflows via orchestration of an available set of services, a process in which a central coordinating enti...
Rohan Sen, Gruia-Catalin Roman, Christopher D. Gil...
JSAC
2007
224views more  JSAC 2007»
13 years 10 months ago
AMOEBA: Robust Location Privacy Scheme for VANET
Abstract— Communication messages in vehicular ad hoc networks (VANET) can be used to locate and track vehicles. While tracking can be beneficial for vehicle navigation, it can a...
Krishna Sampigethaya, Mingyan Li, Leping Huang, Ra...