Sciweavers

1813 search results - page 90 / 363
» Mechanism Design on Trust Networks
Sort
View
ISCC
2002
IEEE
147views Communications» more  ISCC 2002»
15 years 4 months ago
Self-securing ad hoc wireless networks
Mobile ad hoc networking offers convenient infrastructureless communication over the shared wireless channel. However, the nature of ad hoc networks makes them vulnerable to secur...
Haiyun Luo, Petros Zerfos, Jiejun Kong, Songwu Lu,...
WISEC
2010
ACM
15 years 3 days ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
NOSSDAV
1995
Springer
15 years 3 months ago
A Distributed Real-Time MPEG Video Audio Player
Abstract. This paper presents the design, implementation and experimental analysis of a distributed, real-time MPEG video and audio player. The player is designed for use across th...
Shanwei Cen, Calton Pu, Richard Staehli, Crispin C...
IWCMC
2010
ACM
14 years 9 months ago
High performance modified DSR routing protocol for WLAN mesh networks
This work presents a cross-layer modification to the DSR protocol which discovers high throughput paths on multi-hop wireless mesh networks. The modified DSR incorporates a metric...
Mustafa Ramadhan, Mark Davis
VTC
2010
IEEE
167views Communications» more  VTC 2010»
14 years 10 months ago
Pseudo Random Network Coding Design for IEEE 802.16m Enhanced Multicast and Broadcast Service
—Applying network coding on broadcasting service is known to reduce times of transmission in the process of recovering the loss packets. In previous design, coding coefficients ...
Cheng-Chih Chao, Ching-Chun Chou, Hung-Yu Wei