Sciweavers

10044 search results - page 169 / 2009
» Authentication in Wireless Networks
Sort
View
IPSN
2011
Springer
14 years 7 months ago
Demo abstract: Debugging wireless sensor network simulations with YETI and COOJA
Richard Huber, Philipp Sommer, Roger Wattenhofer
158
Voted
ISHPC
1999
Springer
15 years 8 months ago
Integrity and Performance in Network Attached Storage
Computer security is of growing importance in the increasingly networked computing environment.This work examines the issue of high-performance network security, specifically int...
Howard Gobioff, David Nagle, Garth A. Gibson
ICOIN
2007
Springer
15 years 10 months ago
Providing Full QoS with 2 VCs in High-Speed Switches
Alejandro Martínez, Francisco José A...
100
Voted
ICOIN
2007
Springer
15 years 10 months ago
De-triangulation Optimal Solutions for Mobility Scenarios with Asymmetric Links
Pedro Vale Estrela, Teresa Maria Vazão, M&a...
CONEXT
2006
ACM
15 years 10 months ago
An alternative QoS architecture for the IEEE 802.16 standard
In this paper, we propose an alternative QoS architecture for the IEEE 802.16 Standard, that incorporates a priority based packet scheduling and a new traffic shaping. For this, w...
Luís Felipe M. de Moraes, Paulo Ditarso Mac...