Sciweavers

10044 search results - page 1893 / 2009
» Authentication in Wireless Networks
Sort
View
WOWMOM
2005
ACM
90views Multimedia» more  WOWMOM 2005»
15 years 10 months ago
Saturation Throughput Analysis of a System of Interfering IEEE 802.11 WLANs
IEEE 802.11 wireless local area networks that span large buildings or campuses must comprise multiple cells, several of which must necessarily be cochannel cells. It can be shown ...
Manoj K. Panda, Anurag Kumar, S. H. Srinivasan
DCOSS
2005
Springer
15 years 10 months ago
Design and Comparison of Lightweight Group Management Strategies in EnviroSuite
Tracking is one of the major applications of wireless sensor networks. EnviroSuite, as a programming paradigm, provides a comprehensive solution for programming tracking applicatio...
Liqian Luo, Tarek F. Abdelzaher, Tian He, John A. ...
EGC
2005
Springer
15 years 10 months ago
Mobile-to-Grid Middleware: Bridging the Gap Between Mobile and Grid Environments
Currently, access to Grid services is limited to resourceful devices such as desktop PCs but most mobile devices (with wireless network connections) cannot access the Grid network ...
Hassan Jameel, Umar Kalim, Ali Sajjad, Sungyoung L...
MM
2004
ACM
116views Multimedia» more  MM 2004»
15 years 10 months ago
First-year students' paper chase: a mobile location-aware multimedia game
The latest achievements in the field of mobile networks and ubiquitous computing enable the integration and combination of technologies like Internet, Java, and multimedia in a n...
Palle Klante, Jens Krösche, Daniela Ratt, Sus...
MSWIM
2004
ACM
15 years 10 months ago
Speeding up the evaluation of multimedia streaming applications in MANETs using HMMs
Mobile ad-hoc networks (MANETs) present quite large packet loss bursts due to mobility. In this work we propose two models based on hidden Markov models for estimating packet arri...
Carlos Miguel Tavares Calafate, Pietro Manzoni, Ma...
« Prev « First page 1893 / 2009 Last » Next »