Sciweavers

5901 search results - page 1082 / 1181
» Algorithms for Wireless Sensor Networks
Sort
View
ACMSE
2006
ACM
15 years 3 months ago
Security issues in privacy and key management protocols of IEEE 802.16
Without physical boundaries, a wireless network faces many more security threats than a wired network does. Therefore, in the IEEE 802.16 standard a security sublayer is specified...
Sen Xu, Manton M. Matthews, Chin-Tser Huang
GEOS
2007
Springer
15 years 4 months ago
Modeling Spatio-temporal Network Computations: A Summary of Results
Spatio-temporal network is defined by a set of nodes, and a set of edges, where the properties of nodes and edges may vary over time. Such networks are encountered in a variety of...
Betsy George, Shashi Shekhar
NETWORKING
2004
14 years 11 months ago
The Sensitivity of TCP to Sudden Delay Variations in Mobile Networks
Abstract. This paper studies the impact of variable transmission delays on the Transmission Control Protocol (TCP). Sudden delay variations, which are not uncommon in mobile networ...
Michael Scharf, Marc Necker, Bernd Gloss
AHSWN
2008
92views more  AHSWN 2008»
14 years 10 months ago
The (k, l) Coredian Tree for Ad Hoc Networks
In this paper, we present a new efficient strategy for constructing a wireless tree network containing n nodes of diameter while satisfying the QoS requirements such as bandwidth...
Amit Dvir, Michael Segal
DASFAA
2007
IEEE
190views Database» more  DASFAA 2007»
15 years 4 months ago
Clustering Moving Objects in Spatial Networks
Advances in wireless networks and positioning technologies (e.g., GPS) have enabled new data management applications that monitor moving objects. In such new applications, realtime...
Jidong Chen, Caifeng Lai, Xiaofeng Meng, Jianliang...
« Prev « First page 1082 / 1181 Last » Next »