Sciweavers

3751 search results - page 648 / 751
» Events in security protocols
Sort
View
MASCOTS
2010
14 years 11 months ago
On the Universal Generation of Mobility Models
Mobility models have traditionally been tailored to specific application domains such as human, military, or ad hoc transportation scenarios. This tailored approach often renders a...
Alberto Medina, Gonca Gursun, Prithwish Basu, Ibra...
SIMUTOOLS
2008
14 years 11 months ago
Simulating wireless and mobile networks in OMNeT++ the MiXiM vision
Wireless communication has attracted considerable interest in the research community, and many wireless networks are evaluated using discrete event simulators like OMNeT++. Althou...
A. Köpke, M. Swigulski, K. Wessel, D. Willkom...
WCE
2008
14 years 11 months ago
IEEE 802.11E Block Acknowledgement Policies
Optimisation of IEEE 802.11e MAC protocol performance can be performed by modifying several parameters left open in the standard, like buffer size and acknowledgement policies. In ...
Orlando Cabral, Alberto Segarra, Fernando J. Velez
CSREAPSC
2006
14 years 11 months ago
Modelling Application Handovers For Thin-Client Mobility
Mobile users need lightweight devices with low energy consumption. When applications are executed on remote servers instead of locally on the end-user's device, the weight of...
Pieter Simoens, Lien Deboosere, Davy De Winter, Fi...
ISCAPDCS
2003
14 years 11 months ago
Performance Monitoring of N-tier Client/Server Systems
Despite the widespread deployment of client/server technology, there seem to be no tools currently available that are adequate for analyzing and tuning the performance of client/s...
Christoph Steigner, Jürgen Wilke