• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,908
Next 10 →

Wireless Spontaneous Network Creation with Energy Efficient Authentication

by Prof D. N. Rewadkar, Ms. Smita Karve
"... Abstract — Wireless Ad-Hoc networks are a form of peer-topeer network where nodes can communicate with each other without any central infrastructure. In spontaneous network, devices are placed close to each other for accessing services and sharing resources among each other for short period of time ..."
Abstract - Add to MetaCart
Abstract — Wireless Ad-Hoc networks are a form of peer-topeer network where nodes can communicate with each other without any central infrastructure. In spontaneous network, devices are placed close to each other for accessing services and sharing resources among each other for short period of time

AWISPA: An Awareness Framework for Collaborative Spontaneous Networks

by Victor Hugo, Zarate Silva, Edgar Ivan, De Cruz Salgado, O Ramos Quintana, Estudios Superiores, Monterrey Campus Cuernavaca, Mechatronic Departament, Cuernavaca Morelos
"... Abstract- In this work we study and analyze the awareness in collaborative learning environments based on wireless spontaneous networks. A spontaneous network is created when a group of students come together and uses wireless computing devices in order to carry-out a collaborative activity. The spo ..."
Abstract - Add to MetaCart
Abstract- In this work we study and analyze the awareness in collaborative learning environments based on wireless spontaneous networks. A spontaneous network is created when a group of students come together and uses wireless computing devices in order to carry-out a collaborative activity

Spontaneous Networking: An Application-oriented Approach to Ad Hoc Networking

by Laura Marie Feeney, Bengt Ahlgren, Assar Westerlund - IEEE Communications Magazine , 2001
"... An ad hoc network must operate independently of a pre-established or centralized network management infrastructure, while still providing administrative services needed to support applications. Address allocation, name resolution, service location, authentication, and access control policies represe ..."
Abstract - Cited by 44 (1 self) - Add to MetaCart
represent just some of the functionality that must be supported - without pre-configuration n or centralized services. In order to solve these problems, it is necessary to leverage some aspect of the environment in which the network operate. We introduce the notion of a spontaneous network, created when a

Overview of Spontaneous Networking - Evolving Concepts and Technologies

by Stephan Preuss, Clemens Cap , 1999
"... The permanently growing networked IT-infrastructure, the need for more mobility as well as the expansion of computer-aided applications to new areas demand new methods to simplify the handling of ITsystems. ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
The permanently growing networked IT-infrastructure, the need for more mobility as well as the expansion of computer-aided applications to new areas demand new methods to simplify the handling of ITsystems.

Building secure communities in spontaneously networked environments

by Christian Rohner - In 4th Scandinavian Workshop on Wireless Ad-hoc Networks (AdHoc’04 , 2004
"... Abstract – We believe that the critical aspect in providing security for pervasive environments is building security and trust relations between devices without requiring the users to be experts. In this tech-note we present two complementary mechanisms to bootstrap security relations between networ ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
networked devices: the ownership model and a security policy definition language. The ownership model assures security relations between devices owned by the same user, and the security policy language defines security relations to other devices, assigns rights to relations, and supports authentic key

ABSTRACT Rapid and Energy Efficient Neighbor Discovery for Spontaneous Networks

by unknown authors
"... hoc networking enables novel communication paradigms which require the definition of new frameworks and parameters for quality of service (QoS) support. The relevant QoS requirements are frequentlyantagonist and thus also appropriate tradeoff have to be determined and achieved to fit all of them. As ..."
Abstract - Add to MetaCart
. As an example, consider the spontaneous networking featured byself-organizing ad hoc networks. Spontaneous networking can happen onlyif neighboring communication nodes discover each other within a short period of time; however, velocityof discoveryis paid in terms of energyconsumption. In this paper we consider

IEEE Communications Magazine • June 2001176 Spontaneous Networking: An Application-Oriented Approach to

by unknown authors
"... An ad hoc network must operate independent of a preestablished or centralized network manage-ment infrastructure, while still providing admin-istrative services needed to support applications. Address allocation, name resolution, service location, authentication, and access control poli-cies represe ..."
Abstract - Add to MetaCart
-cies represent just some of the functionality that must be supported — without preconfiguration or centralized services. In order to solve these problems, it is necessary to leverage some aspect of the environment in which the network oper-ates. We introduce the notion of a spontaneous network, created when a

Usenet-on-the-fly – Supporting Locality of Information in Spontaneous Networking Environments

by Christian Becker, Martin Bauer, Jörg Hähner - in Ad Hoc Comm. and Collaboration in Ubiq. Comp. Environments , 2002
"... People on the move are typically interested in information with respect to their proximity. Location-based services in general supply users with information about their proximity typically relying on an infrastructure storing the information and tracking the mobile objects, i.e. users. In this paper ..."
Abstract - Cited by 11 (2 self) - Add to MetaCart
. In this paper we present an approach for spontaneous, i.e. ad hoc, networks inspired by the Usenet. Information is exchanged using a peer-to-peer synchronization mechanism. The information is made available through channels grouping related information. The information propagation is solely based

Hardware Security Concept for Spontaneous Network Integration of Mobile Devices

by Igor Sedov, Marc Haase, Clemens Cap, Dirk Timmermann - In Proceedings of the International Workshop "Innovative Internet Computing Systems". Ilmenau. 2001. Shyong , 2001
"... . In this article we introduce an architecture of a mobile device that enables safe and authenticated data-transmission in a spontaneously configured network environment. The usage of this device is illustrated by a number of examples. The hardware and software components are presented. Particul ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
. In this article we introduce an architecture of a mobile device that enables safe and authenticated data-transmission in a spontaneously configured network environment. The usage of this device is illustrated by a number of examples. The hardware and software components are presented

Looking around first: Localized potential-based clustering in spontaneous networks

by Fehmi Ben Abdesslem, Artur Ziviani, Marcelo Dias De Amorim, Petia Todorova - IEEE Communications Letters , 2007
"... Abstract — We propose a new budget-based clustering algorithm for self-organizing networks. The basic idea behind our solution is that nodes first sense the environment using inherent Hello packets before starting forming clusters. In contrast with previous solutions that blindly distribute the budg ..."
Abstract - Cited by 3 (2 self) - Add to MetaCart
Abstract — We propose a new budget-based clustering algorithm for self-organizing networks. The basic idea behind our solution is that nodes first sense the environment using inherent Hello packets before starting forming clusters. In contrast with previous solutions that blindly distribute
Next 10 →
Results 1 - 10 of 1,908
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University