Sciweavers

10044 search results - page 208 / 2009
» Authentication in Wireless Networks
Sort
View
GLOBECOM
2008
IEEE
15 years 11 months ago
Throughput Analysis of Wireless Relay Slotted ALOHA Systems with Network Coding
—This paper deals with a simple but essential two-hop wireless relay network employing network coding and a slotted ALOHA protocol. Network coding is a recent and highly regarded...
Daisuke Umehara, Tomoya Hirano, Satoshi Denno, Mas...
PEWASUN
2005
ACM
15 years 10 months ago
Efficient deafness avoidance in wireless ad hoc and sensor networks with directional antennas
Using directional antennas in wireless ad hoc networks can significantly improve network performance. However, the deafness problem greatly limits the network performance. This pa...
Yihu Li, Ahmed M. Safwat
NETWORK
2006
96views more  NETWORK 2006»
15 years 4 months ago
A wireless biosensor network using autonomously controlled animals
Recent research shows that animals can be guided remotely by stimulating regions of the brain. Therefore, it is possible to set up an animal wireless sensor network for search and...
Yihan Li, Shivendra S. Panwar, Shiwen Mao
LCN
2006
IEEE
15 years 10 months ago
The Internet Group Management Protocol with Access Control (IGMP-AC)
IP Multicast is best known for its bandwidth conservation and lower resource utilization. The classical model of multicast makes it difficult to permit access only to authorized ...
Salekul Islam, J. William Atwood
SWS
2006
ACM
15 years 10 months ago
Single sign-on for java web start applications using myproxy
Single sign-on is critical for the usability of distributed systems. While there are several authentication mechanisms which support single sign-on (e.g. Kerberos and X.509), it m...
Terry Fleury, Jim Basney, Von Welch