Sciweavers

7329 search results - page 241 / 1466
» Network Extractor Protocols
Sort
View
152
Voted
PERCOM
2004
ACM
16 years 3 months ago
Models, Protocols, and Architectures for Secure Pervasive Computing: Challenges and Research Directions
We explore the challenges and research directions in building models, protocols and architectures to support security in pervasive computing environments. We argue that to be succ...
Roshan K. Thomas, Ravi S. Sandhu
ADHOC
2008
131views more  ADHOC 2008»
15 years 4 months ago
Ad hoc routing for multilevel power save protocols
Designing energy efficient protocols for ad hoc networks is important since there has been little improvement in the amount of energy stored on these devices. Previous work [1]
Matthew J. Miller, Nitin H. Vaidya
119
Voted
SENSYS
2009
ACM
15 years 10 months ago
Collection tree protocol
This paper presents and evaluates two principles for wireless routing protocols. The first is datapath validation: data traffic quickly discovers and fixes routing inconsistenc...
Omprakash Gnawali, Rodrigo Fonseca, Kyle Jamieson,...
AINA
2007
IEEE
15 years 10 months ago
Power and Delay Analysis of The WEAC Protocol Based MANET Under Video Transport
Abstract— Transporting video over wireless networks has twofold constraints. Not only should it satisfy delay requirements but power minimization and QoS issues should be handled...
Hafiz M. Asif, Tarek R. Sheltami
ICIP
2006
IEEE
16 years 5 months ago
Design of a Transmission Protocol for a CVE
Virtual reality is a useful tool to train individuals for various different situations or scenarios. A single person utilizing a virtual environment can greatly enhance their skil...
Fred Stakem, Ghassan Alregib, Biing-Hwang Juang, M...