Sciweavers

650 search results - page 88 / 130
» Dynamic Device Access for Mobile Users
Sort
View
AINTEC
2007
Springer
15 years 11 months ago
WOD - Proxy-Based Web Object Delivery Service
With the tremendous growth of World Wide Web (WWW), the door has been opened to a multitude of services and information for even the most casual of users. Today, many wireless and ...
Kai-Hsiang Yang, Jan-Ming Ho
NETWORKING
2000
15 years 6 months ago
A Reliable Subcasting Protocol for Wireless Environments
This paper presents an end-to-end reliable multicast protocol for use in environments with wireless access. It divides a multicast tree into sub-trees where subcasting within these...
Djamel Fawzi Hadj Sadok, Carlos de M. Cordeiro, Ju...
ICN
2005
Springer
15 years 10 months ago
Failover for Mobile Routers: A Vision of Resilient Ambience
The ambient networking approach includes the flexibility of every end system to be not just a node but also an entire network. The end user entities are, in the majority of use cas...
Eranga Perera, Aruna Seneviratne, Roksana Boreli, ...
JSS
2008
96views more  JSS 2008»
15 years 4 months ago
DR-TCP: Downloadable and reconfigurable TCP
Advances in communication technology allow a variety of new network environments and services available very rapidly. Appearance of various network environments tends to enable a ...
Jae-Hyun Hwang, Jin-Hee Choi, Se-Won Kim, Chuck Yo...
TIFS
2008
208views more  TIFS 2008»
15 years 4 months ago
A Network Coding Approach to Secret Key Distribution
We consider the problem of secret key distribution in a sensor network with multiple scattered sensor nodes and a mobile device that can be used to bootstrap the network. Our main...
Paulo F. Oliveira, João Barros