Sciweavers

2068 search results - page 214 / 414
» Performance Analysis of a Distributed Wireless Access Scheme
Sort
View
PERCOM
2006
ACM
16 years 4 months ago
Avoiding privacy violations caused by context-sensitive services
The increasing availability of information about people's context makes it possible to deploy context-sensitive services, where access to resources provided or managed by a s...
Urs Hengartner, Peter Steenkiste
OTM
2007
Springer
15 years 10 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
JSAC
2010
122views more  JSAC 2010»
15 years 3 months ago
A hybrid reservation/contention-based MAC for video streaming over wireless networks
—To reserve or not for bursty video traffic over wireless access networks has been a long-debated issue. For uplink transmissions in infrastructure-based wireless networks and p...
Ruonan Zhang, Rukhsana Ruby, Jianping Pan, Lin Cai...
156
Voted
MOBICOM
2003
ACM
15 years 9 months ago
Distributed algorithms for guiding navigation across a sensor network
We develop distributed algorithms for self-organizing sensor networks that respond to directing a target through a region. The sensor network models the danger levels sensed acros...
Qun Li, Michael DeRosa, Daniela Rus
INFOCOM
2007
IEEE
15 years 11 months ago
Cross-Layer Analysis of Rate Adaptation, DCF and TCP in Multi-Rate WLANs
—Wireless Internet access is facilitated by IEEE 802.11 WLANs that, in addition to realizing a specific form of CSMA/CA—distributed coordination function (DCF)— implement a ...
Jaehyuk Choi, Kihong Park, Chongkwon Kim