The design of an efficient Medium Access Control (MAC) is challenging in ad-hoc networks where users can enter, leave or move inside the network without any need for prior configu...
Multiplayer games for mobile wireless devices are becoming increasingly popular. Many modern devices such as PDAs or mobile telephones are equipped with Bluetooth interfaces. Blue...
Hartmut Ritter, Thiemo Voigt, Min Tian, Jochen H. ...
A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Securi...
Static nodes, e.g. houses, educational institutions etc, can comprise ad-hoc networks using off-the-self wireless technologies with a view to bypass expensive telecommunication so...
: Next to authentication, secure key exchange is considered the most critical and complex issue regarding ad-hoc network security. We present a low-cost, (i.e. low hardware-complex...
Abstract: Recently, Distributed Hash Tables evolved to a preferred approach for decentralized data management in widely distributed systems. Due to their crucial characteristics ...
Tobias Heer, Heiko Niedermayer, Leo Petrak, Simon ...
Achieving QoS (Quality of Service) in Mobile Ad-hoc NETworks (MANET) has been a research topic in the last years. In this paper we describe a QoS reservation mechanism for Routing ...
Ad-hoc networks enable mobile devices to communicate without any fixed infrastructure. While reliable multicasting has been identified as a key application in this context, we a...
In a world of ad-hoc networks, highly interconnected mobile devices and increasingly large supercomputer clusters, students need models of computation that help them think about d...
Ad-hoc networks of mobile devices such as smart phones and PDAs represent a new and exciting distributed system architecture. Building distributed applications on such an architec...
Yang Ni, Ulrich Kremer, Adrian Stere, Liviu Iftode