Sciweavers

7329 search results - page 1301 / 1466
» Network Extractor Protocols
Sort
View
ICDCS
2009
IEEE
16 years 1 months ago
Down the Block and Around the Corner The Impact of Radio Propagation on Inter-vehicle Wireless Communication
Vehicular networks are emerging as a new distributed system environment with myriad possible applications. Most studies on vehicular networks are carried out via simulation, given...
John S. Otto, Fabián E. Bustamante, Randall...
PERCOM
2009
ACM
15 years 10 months ago
Randomizing RFID Private Authentication
—Privacy protection is increasingly important during authentications in Radio Frequency Identification (RFID) systems. In order to achieve high-speed authentication in largescale...
Qingsong Yao, Yong Qi, Jinsong Han, Jizhong Zhao, ...
GLOBECOM
2009
IEEE
15 years 10 months ago
On the Eyeshots of BGP Vantage Points
—The publicly available BGP vantage points (VPs) have been heavily used by the research community to build the Internet autonomous system (AS) level topology, which is a key inpu...
Kai Chen, Chengchen Hu, Wenwen Zhang, Yan Chen, Bi...
ICNS
2009
IEEE
15 years 10 months ago
Counter-Flooding: DoS Protection for Public Key Handshakes in LANs
—The majority of security protocols employ public key cryptography for authentication at least in the connection setup phase. However, verifying digital signatures is an expensiv...
Yves Igor Jerschow, Björn Scheuermann, Martin...
UIC
2009
Springer
15 years 10 months ago
Printing in Ubiquitous Computing Environments
Document printing has long been considered an indispensable part of the workspace. While this process is considered trivial and simple for environments where resources are ample (e...
Athanasios Karapantelakis, Alisa Devlic, Mohammad ...
« Prev « First page 1301 / 1466 Last » Next »