Sciweavers

10044 search results - page 191 / 2009
» Authentication in Wireless Networks
Sort
View
CORR
2010
Springer
142views Education» more  CORR 2010»
15 years 4 months ago
Algebraic Network Coding Approach to Deterministic Wireless Relay Networks
The deterministic wireless relay network model, introduced by Avestimehr et al., has been proposed for approximating Gaussian relay networks. This model, known as the ADT network m...
MinJi Kim, Muriel Médard
ACSC
2005
IEEE
15 years 9 months ago
A File Discovery Control Scheme for P2P File Sharing Applications in Wireless Mobile Environments
The mobility characteristic brings new challenges for research of P2P computing over the wireless mobile networking environment. Peers’ movements in wireless mobile network chan...
Chung-Ming Huang, Tz-Heng Hsu, Ming-Fa Hsu
WOWMOM
2009
ACM
166views Multimedia» more  WOWMOM 2009»
15 years 10 months ago
Business opportunities and considerations on wireless mesh networks
Wireless broadband and Metro WiFi are sweeping through municipalities, campuses, enterprises and public safety organizations creating a buzz of excitement and anticipation unseen ...
George Vasilakis, George Perantinos, Ioannis G. As...
160
Voted
ICWMC
2006
IEEE
15 years 10 months ago
An Overview of MAC Protocols with Directional Antennas in Wireless ad hoc Networks
Although directional antennas have been used in mobile communications systems for quite a long time, realistic applications of directional or smart antennas in wireless ad hoc net...
Hongning Dai, Kam-Wing Ng, Min-You Wu
CORR
2007
Springer
93views Education» more  CORR 2007»
15 years 4 months ago
A Framework for Providing E-Services to the Rural Areas using Wireless Ad Hoc and Sensor Networks
In recent years, the proliferation of mobile computing devices has driven a revolutionary change in the computing world. The nature of ubiquitous devices makes wireless networks th...
Al-Sakib Khan Pathan, Humayun Kadir Islam, Sabit A...