Sciweavers

1565 search results - page 205 / 313
» Optimizing Layered Communication Protocols
Sort
View
124
Voted
PERVASIVE
2007
Springer
15 years 9 months ago
Shake Well Before Use: Authentication Based on Accelerometer Data
Abstract. Small, mobile devices without user interfaces, such as Bluetooth headsets, often need to communicate securely over wireless networks. Active attacks can only be prevented...
Rene Mayrhofer, Hans Gellersen
143
Voted
INFOCOM
2003
IEEE
15 years 9 months ago
Capacity, Delay and Mobility in Wireless Ad-Hoc Networks
Abstract— Network throughput and packet delay are two important parameters in the design and the evaluation of routing protocols for ad-hoc networks. While mobility has been show...
Nikhil Bansal, Zhen Liu
148
Voted
ISCC
1999
IEEE
111views Communications» more  ISCC 1999»
15 years 8 months ago
Towards TCP-Friendly Adaptive Multimedia Applications Based on RTP
For multimedia senders to benefit the most of dynamically changing availability of network resources they need to adjust their transmission behavior in accordance with the network...
Dorgham Sisalem, Adam Wolisz
136
Voted
JPDC
2006
105views more  JPDC 2006»
15 years 3 months ago
Mutual anonymous overlay multicast
Multicast services are demanded by a variety of applications. Many applications require anonymity during their communication. However, there has been very little work on anonymous...
Li Xiao, Yunhao Liu, Wenjun Gu, Dong Xuan, Xiaomei...
122
Voted
INFOCOM
2010
IEEE
15 years 2 months ago
When Watchdog Meets Coding
Abstract—In this paper, we study the problem of misbehavior detection in wireless networks . A commonly adopted approach is to utilize the broadcast nature of the wireless medium...
Guanfeng Liang, Rachit Agarwal, Nitin Vaidya