Sciweavers

1758 search results - page 318 / 352
» Energy-Efficient Communication Protocol for Wireless Microse...
Sort
View
CCS
2001
ACM
15 years 4 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
INFOCOM
2009
IEEE
15 years 6 months ago
Soft-TDMAC: A Software TDMA-Based MAC over Commodity 802.11 Hardware
—We design and implement Soft-TDMAC, a software Time Division Multiple Access (TDMA) based MAC protocol, running over commodity 802.11 hardware. Soft-TDMAC has a synchronization ...
Petar Djukic, Prasant Mohapatra
INFOCOM
2006
IEEE
15 years 5 months ago
Efficient Flooding Scheme Based on 1-Hop Information in Mobile Ad Hoc Networks
—Flooding is one of the most fundamental operations in mobile ad hoc networks. Traditional implementation of flooding suffers from the problems of excessive redundancy of message...
Hai Liu, Peng-Jun Wan, Xiaohua Jia, Xinxin Liu, F....
ICC
2008
IEEE
155views Communications» more  ICC 2008»
15 years 6 months ago
Adaptive Random Network Coding in WiMAX
—The IEEE 802.16 standard, or WiMAX, has emerged as one of the strongest contenders for broadband wireless access technology. In our previous work, we proposed a protocol using r...
Jin Jin, Baochun Li
WCNC
2008
IEEE
15 years 6 months ago
Mobility-Assisted Location Management for Vehicular Ad Hoc Networks
— Vehicular Ad-hoc Networks (VANETs) are gaining importance for inter-vehicle communication, because they allow for the local communication between vehicles without any infrastru...
Zhaomin Mo, Hao Zhu, Kia Makki, Niki Pissinou