Sciweavers

11217 search results - page 1900 / 2244
» Network Coding for Wireless Networks
Sort
View
130
Voted
ISPA
2005
Springer
15 years 9 months ago
Hybrid Authentication and Key Management Scheme for WSANs
:Wireless Sensor and Actor Networks (WSANs) consist of three types of nodes with different capabilities and functions. Because of these heterogeneities, current network security ...
Xiaomei Cao, Mao Lin Huang, YueQuan Chen, Guihai C...
OTM
2005
Springer
15 years 9 months ago
Towards QoS-Awareness of Context-Aware Mobile Applications and Services
In our current connected wireless world, mobile devices are enabled to use various networking facilities. Although this enables mobile users to communicate any time and any place, ...
Katarzyna Wac
147
Voted
ALGOSENSORS
2004
Springer
15 years 9 months ago
On a Conjecture Related to Geometric Routing
We conjecture that any planar 3-connected graph can be embedded in the plane in such a way that for any nodes s and t, there is a path from s to t such that the Euclidean distance ...
Christos H. Papadimitriou, David Ratajczak
ICICS
2004
Springer
15 years 9 months ago
Securing the Destination-Sequenced Distance Vector Routing Protocol (S-DSDV)
A mobile ad hoc network (MANET) is formed by a group of mobile wireless nodes, each of which functions as a router and agrees to forward packets for others. Many routing protocols ...
Tao Wan, Evangelos Kranakis, Paul C. van Oorschot
HICSS
2003
IEEE
134views Biometrics» more  HICSS 2003»
15 years 9 months ago
Secure Connections in Bluetooth Scatternets
Bluetooth is a wireless networking technology specifically developed for Personal Area Networking and other short range applications. Bluetooth devices can be networked together ...
Karl E. Persson, D. Manivannan
« Prev « First page 1900 / 2244 Last » Next »