Sciweavers

1472 search results - page 290 / 295
» Access control in virtual environments
Sort
View
TEI
2010
ACM
110views Hardware» more  TEI 2010»
15 years 4 months ago
Empowering programmability for tangibles
Programming microcontrollers for tangible interfaces can be easier and more accessible than it is now, empowering a broader audience to participate. The first part of this studio ...
Eric Rosenbaum, Evelyn Eastmond, David Mellis
ICC
2007
IEEE
124views Communications» more  ICC 2007»
15 years 3 months ago
Emulating End-to-End Losses and Delays for Ad Hoc Networks
— Ad hoc networks have gained place in the research area recently. There are many researches regarding different topics related to such networks, such as routing, media access co...
Alaa Seddik-Ghaleb, Yacine Ghamri-Doudane, Sidi-Mo...
LADC
2007
Springer
15 years 3 months ago
Security Patterns and Secure Systems Design
Analysis and design patterns are well established as a convenient and reusable way to build high-quality object-oriented software. Patterns combine experience and good practices t...
Eduardo B. Fernández
BROADNETS
2006
IEEE
15 years 3 months ago
CAM-MAC: A Cooperative Asynchronous Multi-Channel MAC Protocol for Ad Hoc Networks
— Medium access control (MAC) protocols have been studied under different contexts for several years now. In all these MAC protocols, nodes make independent decisions on when to ...
Tie Luo, Mehul Motani, Vikram Srinivasan
73
Voted
MSWIM
2005
ACM
15 years 3 months ago
Using statistical design of experiments for analyzing mobile ad hoc networks
The performance of mobile ad hoc networks can be influenced by numerous factors, including protocol design at every layer; parameter settings such as retransmission limits and ti...
Michael W. Totaro, Dmitri D. Perkins