Sciweavers

4761 search results - page 729 / 953
» Performance of Protocols
Sort
View
FC
2009
Springer
150views Cryptology» more  FC 2009»
15 years 11 months ago
Privacy-Preserving Information Markets for Computing Statistical Data
Abstract. Consider an “information market” where private and potentially sensitive data are collected, treated as commodity and processed into aggregated information with comme...
Aggelos Kiayias, Bülent Yener, Moti Yung
GLOBECOM
2007
IEEE
15 years 4 months ago
Multi-Class QoS in 802.11 Networks Using Gentle Decrease of Multiple Contention Windows
—IEEE 802.11 Distributed Coordination Function (DCF) uses a binary exponential backoff algorithm to arbitrate simultaneous channel access by multiple stations. When a station sen...
Bushra Anjum, Zartash Afzal Uzmi
USS
2010
15 years 2 months ago
Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study
Wireless networks are being integrated into the modern automobile. The security and privacy implications of such in-car networks, however, are not well understood as their transmi...
Ishtiaq Rouf, Rob Miller, Hossen Mustafa, Travis T...
ICIC
2009
Springer
15 years 2 months ago
An Intelligent Prediction Model for Generating LGD Trigger of IEEE 802.21 MIH
IEEE recently standardized 802.21-2008 Media Independent Handover (MIH) standard. MIH is a key milestone toward the evolution of integrated heterogeneous 4G wireless networks. MIH ...
Muhammad Yousaf, Sohail Bhatti, Maaz Rehan, Amir Q...
ADHOC
2004
134views more  ADHOC 2004»
15 years 4 months ago
Scalable team multicast in wireless ad hoc networks exploiting coordinated motion
In this paper, we study a new multicast paradigm for large scale mobile ad hoc networks, namely team multicast. In team multicast the multicast group does not consist of individua...
Yunjung Yi, Mario Gerla, Katia Obraczka