Sciweavers

17 search results - page 2 / 4
» mobicom 2000
Sort
View
MOBICOM
2000
ACM
13 years 9 months ago
Intrusion detection in wireless ad-hoc networks
As the recent denial-of-service attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particula...
Yongguang Zhang, Wenke Lee
MOBICOM
2000
ACM
13 years 9 months ago
Sending messages to mobile users in disconnected ad-hoc wireless networks
An ad-hoc network is formed by a group of mobile hosts upon a wireless network interface. Previous research in this area has concentrated on routing algorithms which are designed ...
Qun Li, Daniela Rus
MOBICOM
2000
ACM
13 years 9 months ago
Distributed fair scheduling in a wireless LAN
—Fairness is an important issue when accessing a shared wireless channel. With fair scheduling, it is possible to allocate bandwidth in proportion to weights of the packet flows ...
Nitin H. Vaidya, Paramvir Bahl, Seema Gupta
MOBICOM
2000
ACM
13 years 9 months ago
W-mail: an electronic mail system for wearable computing environments
This paper describes an e-mail system for wearable computing environments. In this system, we extend the conventional mail format and the server/client(browser) architecture by co...
Hirotaka Ueda, Masahiko Tsukamoto, Shojiro Nishio
MOBICOM
2000
ACM
13 years 9 months ago
A scalable low-latency cache invalidation strategy for mobile environments
—Caching frequently accessed data items on the client side is an effective technique for improving performance in a mobile environment. Classical cache invalidation strategies ar...
Guohong Cao