... Communications and Networking
Volume 2011, Article ID 935457, 11 pages
doi:10.1155/2011/935457
Research Article
Efficient Public Key Certificate Management for
Mobile Ad Hoc Networks
P. Caballero-Gil and ... path
discovery in mobile ad- hoc networks,” Computer Communi-
cations, vol. 30, no. 7, pp. 1498–1512, 2007.
[23] R. Li, J. Li, P. Liu, and H H. Chen, “On-demand...
... range:
x
∈ [0, T].
2 EURASIP Journal on Information Security
on additive spread-spectrum and Spread-Transform Dither
Modulation (ST-DM), and rewritten in a form that greatly
improves its communication ... (ROC), namely,
additive spread spectrum with a correlation-based detector
(SS), spread-transform dither modulation without distor-
tion compensation (ST-DM), and additive spread spectrum
wit...
... its own
proxy for one key part or key nugget) and sends out
request for proxy packets containing key IDs for both
nodes N
1
and N
2
. Each recipient examines the key
identifiers (key IDs) list ... “Node-disjointness-based multipath
routing for mobile ad hoc networks,” in Proceedings of the
1st ACM Inter n ational Workshop on Performance Evaluation
of Wireless Ad Hoc,...
... ferrying
approach for data delivery in sparse mobile Ad Hoc networks,”
in Proceedings of the 5th ACM International Symposium on
Mobile Ad Hoc Networking and Computing (MoBiHoc ’04),pp.
187–198, ... networks [6–10]. Within
the problem domain under consideration, sparse mobile ad
hoc networks are the focus of our research. Mobile ad hoc
networks (MANETs) are considere...
... outperforms in most of the
simulations. With higher traffic load, RAUR has shown more
tolerance to the increase of network traffic load, it is scalable
as the routing load change is small and gradual ... ad hoc
wireless networks,” in Mobile Computing,T.Imielinskiand
H. F. Korth, Eds., chapter 5, Kluwer Academic Publishers,
Dodrecht, The Netherlands, 1996.
[4] C. E. Perkins and E. M. Royer,...
... Publishing Corporation
EURASIP Journal on Advances in Signal Processing
Volume 2011, Article ID 176026, 25 pages
doi:10.1155/2011/176026
Research Article
Efficient Data Association in Visual Sensor ... appr.II
inference, averaging at 0.0127 for forward pass and 0.0129 for
backward. Moreover, the KL divergence of appr.I inference
has much more spikes than that of appr.II, both in fo...
... Corporation
EURASIP Journal on Advances in Signal Processing
Volume 2011, Article ID 646134, 8 pages
doi:10.1155/2011/646134
Research Article
Efficient Dispersion Generation Structures for
Spring Reverb Emulation
Julian ... frequency, and, therefore, the
order of the Linkwitz-Riley crossover can be reduced to 4,
consisting of two cascaded second-order Butterworth filters
for each ba...
... Publishing Corporation
EURASIP Journal on Advances in Signal Processing
Volume 2010, Article ID 106562, 14 pages
doi:10.1155/2010/106562
Research Article
Efficient Compensation of Transmitter and ... adopted
transmission techniques for broadband communication
systems [1]. OFDM has been adopted in a variety of
wireless communication standards, for example, for wireless
local area...
... Networking
Volume 2010, Article ID 282465, 15 pages
doi:10.1155/2010/282465
Research Article
Efficient Uplink Modeling for Dynamic System-Level Simulations
of Cellular and Mobile Networks
Ingo Viering,
1
Andreas ... they address all users u in cell
c in ascending order with respect to M
max,u
’s, that is, w
c,1
addresses the worst user in cell c, w
c,2
addresses the second
worst us...
... to perform microkey
management. Compared with the logical key hierarchy
(LKH), the above schemes can more significantly reduce the
overload of the key server and provide more efficient key
management ... M. Manulis, “Contributory group key agreement protocols,
revisited for mobile ad- hoc groups,” in Proceedings of the 2nd
IEEE International Conference on Mobile Ad- Hoc an...