Sciweavers

644 search results - page 116 / 129
» Adaptive security protocol selection for mobile computing
Sort
View
ICDCSW
2007
IEEE
15 years 3 months ago
Object-Swapping for Resource-Constrained Devices
Mobile devices are still memory-constrained when compared to desktop and laptop computers. Thus, in some circumstances, even while occupied by useful objects, some memory must be ...
Luís Veiga, Paulo Ferreira
CONEXT
2009
ACM
14 years 10 months ago
ARES: an anti-jamming reinforcement system for 802.11 networks
Dense, unmanaged 802.11 deployments tempt saboteurs into launching jamming attacks by injecting malicious interference. Nowadays, jammers can be portable devices that transmit int...
Konstantinos Pelechrinis, Ioannis Broustis, Srikan...
ISCIS
2004
Springer
15 years 2 months ago
Multicast Routing for Ad Hoc Networks with a Multiclass Scheme for Quality of Service
As multimedia- and group-oriented computing becomes increasingly popular for the users of wireless mobile networks, the importance of features like quality of service (QoS) and mul...
Kaan Bür, Cem Ersoy
WMASH
2003
ACM
15 years 2 months ago
End-to-end throughput and delay assurances in multihop wireless hotspots
Next generation Wireless Local Area Networks (WLAN’s) are likely to require multihop wireless connections between mobile nodes and Internet gateways to achieve high data rates f...
Kuang-Ching Wang, Parameswaran Ramanathan
WONS
2005
IEEE
15 years 3 months ago
Building a Better Wireless Mousetrap: Need for More Realism in Simulations
Reliable network simulators are important tools for research and development in the field of wireless communication. Although the ns-2 simulator is quite popular for testing wire...
Matthias Wellens, Marina Petrova, Janne Riihij&aum...