Sciweavers

100 search results - page 20 / 20
» Public Key Authentication Schemes for Local Area Networks
Sort
View
MOBICOM
2004
ACM
13 years 11 months ago
A scalable model for channel access protocols in multihop ad hoc networks
A new modeling framework is introduced for the analytical study of medium access control (MAC) protocols operating in multihop ad hoc networks. The model takes into account the eï...
Marcelo M. Carvalho, Jose Joaquin Garcia-Luna-Acev...
WWW
2010
ACM
14 years 12 days ago
Distributing private data in challenged network environments
Developing countries face signiï¬cant challenges in network access, making even simple network tasks unpleasant. Many standard techniques—caching and predictive prefetching— ...
Azarias Reda, Brian D. Noble, Yidnekachew Haile
PDIS
1994
IEEE
13 years 9 months ago
Distributed Selective Dissemination of Information
To help users cope with information overload, Selective Dissemination of Information SDI will increasingly become an important tool in wide area information systems. In an SDI ser...
Tak W. Yan, Hector Garcia-Molina
QSHINE
2009
IEEE
14 years 4 days ago
Supporting VoIP Services in IEEE 802.11e WLANs
Voice over Internet Protocol (VoIP) over Wireless Local Area Network (WLAN) is becoming popular thanks to its cost efficiency. However, it has been a challenge to provide good qual...
Jeonggyun Yu, Munhwan Choi, Daji Qiao, Sunghyun Ch...
VLDB
1987
ACM
78views Database» more  VLDB 1987»
13 years 9 months ago
Measured Performance of Time Interval Concurrency Control Techniques
This paper reports on an implementation of Bayer's Time Interval concurrency control method and compares it to the performance of a conventional timestamp method. The impleme...
Jerre D. Noe, David B. Wagner