Sciweavers

1692 search results - page 286 / 339
» Evaluation of Security Mechanisms in Wireless Sensor Network...
Sort
View
AICT
2006
IEEE
117views Communications» more  AICT 2006»
15 years 5 months ago
Mapping DiffServ to MAC differentiation for IEEE 802.11e
In Internet, the user's traffic crosses several domains. More and more the users want end-to-end quality of service (QoS). So it’s necessary to have differentiation mechani...
Mounir Frikha, Tibi Najet, Faiza Tabbana
PERCOM
2010
ACM
14 years 6 months ago
Detecting activities from body-worn accelerometers via instance-based algorithms
The automatic and unobtrusive identification of user's activities is one of the challenging goals of context-aware computing. This paper discusses and experimentally evaluate...
Nicola Bicocchi, Marco Mamei, Franco Zambonelli
ACISICIS
2005
IEEE
15 years 5 months ago
Performance Analysis on Mobility of Ad-Hoc Network for Inter-Vehicle Communication
This paper presents the feasibility of using an ad-hoc network as an infrastructure for a small group of inter-vehicle communication network. Mobile ad-hoc networking with wireles...
Jaehyun Kim, Woojin Han, Woohyuk Choi, Yunil Hwang...
JDCTA
2010
172views more  JDCTA 2010»
14 years 6 months ago
Characterizing MEGACO Security in the presence Diameter Server
This paper analyzes performance of MEGACO (Media Gateway Control Protocol) based on Diameter which is an Authentication, Authorization,andAccounting (AAA) protocol developed withi...
Pedram Hajipour, Kolsoom Abbasi Shahkooh
WONS
2005
IEEE
15 years 5 months ago
MASSIVE: An Emulation Environment for Mobile Ad-Hoc Networks
Developing and evaluating protocols and applications for mobile ad-hoc networks requires significant organisational effort when real mobile ad-hoc networks with several mobile te...
Michael Matthes, Holger Biehl, Michael Lauer, Oswa...