- This paper presents a description and performance evaluation of a threshold secret sharing (TSS) authentication scheme for selfsecuring mobile ad hoc networks (MANETs) suffering ...
—An important challenge in mobile sensor networks is to enable energy-efficient communication over a diversity of distances while being robust to wireless effects caused by node...
Jeremy Gummeson, Deepak Ganesan, Mark D. Corner, P...
We show that there is a trade-off among mobility, capacity, and delay in ad hoc networks. More specifically, we consider two schemes for node mobility in ad hoc networks. We divid...
Renato M. de Moraes, Hamid R. Sadjadpour, J. J. Ga...
— We show that simple radio propagation and node mobility models widely used in MANET evaluation are not robust in indoor environments. Robust simulation models let researchers e...
We propose and evaluate a mobile, peer-to-peer Information Retrieval system. Such a system can, for example, support medical care in a disaster by allowing access to a large colle...
Broadcasting is a commonly used communication primitive needed by many applications and protocols in mobile ad hoc networks (MANETs). Unfortunately, most broadcast solutions are ta...
Abstract— This paper describes an original approach to writing reactive algorithms on highly dynamic networks. We propose to use randomly mobile agents to gather global informati...
In this paper we focus on the problems of maintaining Ad Hoc network connectivity in the presence of node mobility whilst providing globally efficient and robust routing. The com...
Menghow Lim, Adam Chesterfield, Jon Crowcroft, Jul...
The random trip model was recently proposed as a generic mobility model that contains many particular mobility models, including the widely-known random waypoint and random walks,...
Santashil PalChaudhuri, Jean-Yves Le Boudec, Milan...
As mobile devices, such as laptops, PDAs or mobile phones, are getting more and more ubiquitous and are able to communicate with each other via wireless technologies, the paradigm...