Sciweavers

3751 search results - page 571 / 751
» Events in security protocols
Sort
View
IMC
2007
ACM
15 years 2 months ago
Understanding handoffs in large ieee 802.11 wireless networks
As the utility of wireless technology grows, wireless networks are being deployed in more widely varying conditions. The monitoring of these networks continues to reveal key imple...
Ramya Raghavendra, Elizabeth M. Belding, Konstanti...
SIMUTOOLS
2008
15 years 2 months ago
A simulation model of DYMO for ad hoc routing in OMNeT++
Mobile Ad Hoc Networks (MANETs) have evolved in the last years into standards in the communication world. By definition, they do not need any network infrastructure to facilitate ...
Christoph Sommer, Isabel Dietrich, Falko Dressler
86
Voted
WISES
2003
15 years 2 months ago
Intelligent UART Module for Real-Time Applications
— More and more fieldbus applications require a communication with real-time properties, while still being economically feasible. The fieldbuses LIN and TTP/A take this require...
Martin Delvai, Ulrike Eisenmann, Wilfried Elmenrei...
85
Voted
CN
2007
74views more  CN 2007»
15 years 24 days ago
SSVP: A congestion control scheme for real-time video streaming
In this paper, we present a new end-to-end protocol, namely Scalable Streaming Video Protocol (SSVP), which operates on top of UDP and is optimized for unicast video streaming app...
Panagiotis Papadimitriou, Vassilis Tsaoussidis
104
Voted
IJAHUC
2006
71views more  IJAHUC 2006»
15 years 24 days ago
Elapsed time on arrival: a simple and versatile primitive for canonical time synchronisation services
: Time synchronisation is one of the most important and fundamental middleware services for wireless sensor networks. However, there is an apparent disconnect between existing time...
Branislav Kusy, Prabal Dutta, Philip Levis, Mikl&o...