Sciweavers

9702 search results - page 55 / 1941
» Communicating Mobile Processes
Sort
View
193
Voted
PE
2006
Springer
193views Optimization» more  PE 2006»
15 years 3 months ago
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content excha...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
138
Voted
MDM
2007
Springer
124views Communications» more  MDM 2007»
15 years 9 months ago
Isolating Transactions on Replicated Content Going Mobile
Mobile databases are a centerpiece of the dramatic growth of data-centric applications for mobile computing, nomadic communication and wireless networks. Replication of database c...
José Enrique Armendáriz-Iñigo...
125
Voted
ICCCN
1998
IEEE
15 years 8 months ago
Fast Recovery Protocol for Database and Link Failures in Mobile Networks
An important issue in the design of future Personal Communication Services (PCS) networks is the efficient management of location information. The current IS-41 standard P C S arc...
Govind Krishnamurthi, Stefano Chessa, Arun K. Soma...
124
Voted
WIMOB
2009
IEEE
15 years 10 months ago
Characterizing the Influence of Human Presence on Bistatic Passive RFID-System
Dominik Lieckfeldt, Jiaxi You, Dirk Timmermann
91
Voted
WIMOB
2008
IEEE
15 years 10 months ago
Spectrum Management in Cognitive Radio Networks
Ian F. Akyildiz