Sciweavers

1565 search results - page 197 / 313
» Optimizing Layered Communication Protocols
Sort
View
135
Voted
PERVASIVE
2008
Springer
15 years 3 months ago
Localized power-aware routing in linear wireless sensor networks
Energy-efficency is a key concern when designing protocols for wireless sensor networks (WSN). This is of particular importance in commercial applications where demonstrable retur...
Marco Zimmerling, Waltenegus Dargie, Johnathan M. ...
88
Voted
WOWMOM
2006
ACM
127views Multimedia» more  WOWMOM 2006»
15 years 9 months ago
AISLE: Autonomic Interface SeLEction for Wireless Users
We address the problem of wireless stations selfconfiguration in a WLAN environment with overlapping access point coverages. We propose and investigate a transport-layer solution...
Claudio Casetti, Carla-Fabiana Chiasserini, Robert...
146
Voted
CONEXT
2005
ACM
15 years 5 months ago
MRS: a simple cross-layer heuristic to improve throughput capacity in wireless mesh networks
Wireless Mesh Networks (WMNs) are an emerging architecture based on multi-hop transmission. ISPs considers WMNs as a potential future technology to offer broadband Internet acces...
Luigi Iannone, Serge Fdida
118
Voted
JUCS
2010
114views more  JUCS 2010»
14 years 10 months ago
On Reliable Platform Configuration Change Reporting Mechanisms for Trusted Computing Enabled Platforms
: One of the most important use-cases of Trusted Computing is Remote Attestation. It allows platforms to get a trustworthy proof of the loaded software and current configuration of...
Kurt Dietrich
155
Voted
EUROCRYPT
2008
Springer
15 years 5 months ago
Isolated Proofs of Knowledge and Isolated Zero Knowledge
We introduce a new notion called -isolated proofs of knowledge ( -IPoK). These are proofs of knowledge where a cheating prover is allowed to exchange up to bits of communication wi...
Ivan Damgård, Jesper Buus Nielsen, Daniel Wi...