Sciweavers

11217 search results - page 1891 / 2244
» Network Coding for Wireless Networks
Sort
View
123
Voted
PERCOM
2006
ACM
16 years 3 months ago
Multi-channel Protocols for Group Key Agreement in Arbitrary Topologies
We consider group key agreement (GKA) protocols, used by a group of peers to establish a shared secret key for multicast communications. There has been much previous work to impro...
Ford-Long Wong, Frank Stajano
146
Voted
PERCOM
2005
ACM
16 years 3 months ago
Policy-Driven Data Dissemination for Context-Aware Applications
Context-aware pervasive-computing applications require continuous monitoring of their physical and computational environment to make appropriate adaptation decisions in time. The ...
Guanling Chen, David Kotz
PERCOM
2005
ACM
16 years 3 months ago
Using Symbiotic Displays to View Sensitive Information in Public
Symbiotic displays are intelligent network devices that can be enlisted on demand by mobile devices, offering higher resolutions and larger viewing areas. Users of small mobile de...
Stefan Berger, Rick Kjeldsen, Chandrasekhar Naraya...
117
Voted
PERCOM
2005
ACM
16 years 3 months ago
Re-Conceptualizing Learning Environments: A Framework for Pervasive eLearning
Pervasive eLearning requires a novel media perspective on learning objects. Instead of viewing handhelds or smart phones as minimized PCs we would like to propose a perspective on...
Reinhard Keil-Slawik, Thorsten Hampel, Bernd E&szl...
PERCOM
2005
ACM
16 years 3 months ago
When Does Opportunistic Routing Make Sense?
Different opportunistic routing protocols have been proposed recently for routing in sensor networks. These protocols exploit the redundancy among nodes by using a node that is av...
Adam Wolisz, Jan M. Rabaey, Rahul C. Shah, Sven Wi...
« Prev « First page 1891 / 2244 Last » Next »