Sciweavers

1692 search results - page 272 / 339
» Evaluation of Security Mechanisms in Wireless Sensor Network...
Sort
View
COMCOM
2010
90views more  COMCOM 2010»
14 years 12 months ago
The room shortage problem of tree-based ZigBee/IEEE 802.15.4 wireless networks
A number of IEEE 802.15.4 devices can form a tree topology as proposed by ZigBee specification. The ability to confine the shape and extent of the tree serves as the basis for add...
Li-Hsing Yen, Wei-Ting Tsai
IFIP
2007
Springer
15 years 6 months ago
Multicast in UMTS: Adopting TCP-Friendliness
In this paper, we present a novel mechanism for the multicast congestion control over UMTS networks. The proposed mechanism is based on the well known TCP-Friendly Multicast Conges...
Antonios G. Alexiou, Christos Bouras, Andreas Papa...
INFOCOM
2005
IEEE
15 years 5 months ago
rDCF: a relay-enabled medium access control protocol for wireless ad hoc networks
—It is well known that IEEE 802.11 provides a physical layer multirate capability and, hence, MAC layer mechanisms are needed to exploit this capability. Several solutions have b...
Hao Zhu, Guohong Cao
CCS
2005
ACM
15 years 5 months ago
CPOL: high-performance policy evaluation
Policy enforcement is an integral part of many applications. Policies are often used to control access to sensitive information. Current policy specification languages give users ...
Kevin Borders, Xin Zhao, Atul Prakash
PERCOM
2006
ACM
15 years 11 months ago
Enhancing Bluetooth Connectivity with RFID
One of the challenges in pervasive computing is communication between a mobile user's terminal and the continuously changing local environment. Bluetooth is one potential opt...
Timo Salminen, Simo Hosio, Jukka Riekki