Sciweavers

251 search results - page 28 / 51
» Design of a SPDIF Receiver Using Protocol Compiler
Sort
View
JNW
2006
86views more  JNW 2006»
14 years 9 months ago
Throughput and Delay Analysis of Unslotted IEEE 802.15.4
The IEEE 802.15.4 standard is designed as a low power and low data rate protocol offering high reliability. It defines a beaconed and unbeaconed version. In this work, we analyze t...
Benoît Latré, Pieter De Mil, Ingrid M...
WICON
2008
14 years 11 months ago
A study of MAC schemes for wireless sensor networks powered by ambient energy harvesting
Energy consumption is a perennial issue in the design of wireless sensor networks which typically rely on portable sources like batteries for power. Recent advances in ambient ene...
Zhi Ang Eu, Winston Khoon Guan Seah, Hwee Pink Tan
CCS
2005
ACM
15 years 3 months ago
Automated trust negotiation using cryptographic credentials
In automated trust negotiation (ATN), two parties exchange digitally signed credentials that contain attribute information to establish trust and make access control decisions. Be...
Jiangtao Li, Ninghui Li, William H. Winsborough
JPDC
2008
128views more  JPDC 2008»
14 years 9 months ago
An interference-aware fair scheduling for multicast in wireless mesh networks
Multicast is a fundamental routing service in wireless mesh networks (WMNs) due to its many potential applications such as video conferencing, online games, and webcast. Recently,...
Dimitrios Koutsonikolas, Saumitra M. Das, Y. Charl...
AINA
2008
IEEE
15 years 4 months ago
Towards a Usenet-Like Discussion System for Users of Disconnected MANETs
Applications that rely on the publish-subscribe model (such as those dedicated to news or event distribution) require a communication model whereby information can flow towards a...
Julien Haillot, Frédéric Guidec