Sciweavers

10044 search results - page 1964 / 2009
» Authentication in Wireless Networks
Sort
View
EWSN
2010
Springer
15 years 8 months ago
Phoenix: An Epidemic Approach to Time Reconstruction
Abstract. Harsh deployment environments and uncertain run-time conditions create numerous challenges for postmortem time reconstruction methods. For example, motes often reboot and...
Jayant Gupchup, Douglas Carlson, Razvan Musaloiu-E...
SENSYS
2009
ACM
15 years 5 months ago
TOSThreads: thread-safe and non-invasive preemption in TinyOS
Many threads packages have been proposed for programming wireless sensor platforms. However, many sensor network operating systems still choose to provide an eventdriven model, du...
Kevin Klues, Chieh-Jan Mike Liang, Jeongyeup Paek,...
ICASSP
2009
IEEE
15 years 5 months ago
Beacon-assisted spectrum access with cooperative cognitive transmitter and receiver
—Spectrum access is an important function of cognitive radios for detecting and utilizing spectrum holes without harming the legacy systems. In this paper, we propose novel coope...
Ali Tajer, Xiaodong Wang
103
Voted
SIGCOMM
2009
ACM
15 years 5 months ago
mango: low-cost, scalable delivery of rich content on mobiles
We present mango, a low-cost and highly scalable content-delivery service for mobile phones. The service is targeted at emerging countries such as India where users are highly pri...
Ankur Jain, Sharad Jaiswal, Anirban Majumder, K. V...
INFOCOM
2008
IEEE
15 years 5 months ago
Proxy Caching in Split TCP: Dynamics, Stability and Tail Asymptotics
Abstract—The split of a multihop, point to point TCP connection consists in replacing a plain, end-to-end TCP connection by a cascade of TCP connections. In such a cascade, conne...
François Baccelli, Giovanna Carofiglio, Ser...
« Prev « First page 1964 / 2009 Last » Next »