Sciweavers

10044 search results - page 1892 / 2009
» Authentication in Wireless Networks
Sort
View
QSHINE
2005
IEEE
15 years 10 months ago
Solving The Multi-Constrained Path Selection Problem By Using Depth First Search
An extended depth-first-search (EDFS) algorithm is proposed to solve the multi-constrained path (MCP) problem in quality-of-service (QoS) routing, which is NP-Complete when the n...
Zhenjiang Li, J. J. Garcia-Luna-Aceves
RTCSA
2005
IEEE
15 years 10 months ago
Scheduling Support for Guaranteed Time Services in IEEE 802.15.4 Low Rate WPAN
We propose a real-time message scheduling algorithm which is applied to schedule periodic realtime messages in IEEE 802.15.4 for LR-WPAN(Low Rate Wireless Personal Area Network). ...
Seongeun Yoo, Daeyoung Kim, Minh-Long Pham, Yoonme...
WORDS
2005
IEEE
15 years 10 months ago
An Adaptable Security Framework for Service-based Systems
A major advantage of service-based computing technology is the ability to enable rapid formation of large-scale distributed systems by composing massively available services to ac...
Stephen S. Yau, Yisheng Yao, Zhaoji Chen, Luping Z...
169
Voted
MOBICOM
2005
ACM
15 years 10 months ago
VITP: an information transfer protocol for vehicular computing
Recent advances in wireless inter-vehicle communication systems enable the development of Vehicular Ad-Hoc Networks (VANET) and create significant opportunities for the deploymen...
Marios D. Dikaiakos, Saif Iqbal, Tamer Nadeem, Liv...
WOWMOM
2005
ACM
129views Multimedia» more  WOWMOM 2005»
15 years 10 months ago
Lightweight Replication Middleware for Data and Service Components in Dense MANETs
The increasing diffusion of wireless-enabled portable devices is pushing towards service provisioning over dense Mobile Ad-hoc NETworks (MANETs), i.e., limited spatial regions, su...
Paolo Bellavista, Antonio Corradi, Eugenio Magistr...
« Prev « First page 1892 / 2009 Last » Next »