Sciweavers

WOWMOM
2005
ACM
83views Multimedia» more  WOWMOM 2005»
13 years 10 months ago
Java-Based Proactive Buffering for Multimedia Streaming Continuity in the Wireless Internet
New challenging deployment scenarios are accommodating portable devices with limited and heterogeneous capabilities that roam among wireless access localities during service provi...
Paolo Bellavista, Antonio Corradi, Luca Foschini
WOWMOM
2005
ACM
108views Multimedia» more  WOWMOM 2005»
13 years 10 months ago
Reducing Inter-Cluster TDMA Interference by Adaptive MAC Allocation in Sensor Networks
This paper presents a Self-Reorganizing Slot Allocation (SRSA) mechanism for TDMA based Medium Access Control (MAC) in multi-cluster sensor networks. The aim is to provide a MAC l...
Tao Wu, Subir K. Biswas
WOWMOM
2005
ACM
131views Multimedia» more  WOWMOM 2005»
13 years 10 months ago
Ad-Hoc Extensions to the 802.15.3 MAC Protocol
The paper describes the design and evaluation of AdHoc extensions to the IEEE 802.15.3 Medium Access Control (MAC) layer for Wireless Personal Area Networks (WPANs). The proposed ...
Samir Datta, Ivan Seskar, Mustafa Demirhan, Siun-C...
WOWMOM
2005
ACM
135views Multimedia» more  WOWMOM 2005»
13 years 10 months ago
Stable, Congestion-Controlled Application-Layer Multicasting in Pedestrian Ad-Hoc Networks
Ad-hoc networks enable mobile devices to communicate without any fixed infrastructure. While reliable multicasting has been identified as a key application in this context, we a...
Peter Baumung
WOWMOM
2005
ACM
139views Multimedia» more  WOWMOM 2005»
13 years 10 months ago
An Agile Approach to Distributed Information Dissemination in Mobile Ad Hoc Networks
In order to ease the challenging task of information dissemination in a MANET, we employ a legend: a data structure passed around a network to share information with all the mobil...
Nicholas Bauer, Michael Colagrosso, Tracy Camp
WOWMOM
2005
ACM
79views Multimedia» more  WOWMOM 2005»
13 years 10 months ago
A Power Allocation Algorithm for Throughput Maximization in Mobile Networks
Enzo Baccarelli, Mauro Biagi, Cristian Pelizzoni, ...
WOWMOM
2005
ACM
132views Multimedia» more  WOWMOM 2005»
13 years 10 months ago
Comparisons of Inter-Domain Routing Schemes for Heterogeneous Ad Hoc Networks
— In this paper, we propose three interdomain routing schemes for communications between different ad-hoc groups (subnets), namely the implicit foreign degree based (IFD), the ex...
Wenbin Ma, Mooi Choo Chuah
WOWMOM
2005
ACM
95views Multimedia» more  WOWMOM 2005»
13 years 10 months ago
Incremental Trust: Building Trust from Past Experience
Emerging ubiquitous computing leverages the need for automated trust management models. We take a domestic network of both fixed and mobile nodes as our reference scenario and in...
Marco Domenico Aime, Antonio Lioy
WOWMOM
2005
ACM
86views Multimedia» more  WOWMOM 2005»
13 years 10 months ago
The Wireless Opaque Channel to Contrast Information Leakage
Widespread adoption of wireless devices has considerably enlarged the domain of user applications, but consequently specific issues related to a secure use of these devices arise...
Marco Domenico Aime, Andrea S. Atzeni, Antonio Lio...
WOWMOM
2005
ACM
133views Multimedia» more  WOWMOM 2005»
13 years 10 months ago
A Statistical Matching Approach to Detect Privacy Violation for Trust-Based Collaborations
Distributed trust and reputation management mechanisms are often proposed as a means of providing assurance in dynamic and open environments by enabling principals to building up ...
Mohamed Ahmed, Daniele Quercia, Stephen Hailes