Sciweavers

1030 search results - page 134 / 206
» Protocols Using Anonymous Connections: Mobile Applications
Sort
View
141
Voted
TPDS
2008
126views more  TPDS 2008»
15 years 5 months ago
Efficient Directional Network Backbone Construction in Mobile Ad Hoc Networks
In this paper, we consider the issue of constructing an energy-efficient virtual network backbone in mobile ad hoc networks (MANETs) for broadcasting applications using directiona...
Shuhui Yang, Jie Wu, Fei Dai
161
Voted
SEFM
2005
IEEE
15 years 11 months ago
Experimental Evaluation of FSM-Based Testing Methods
The development of test cases is an important issue for testing software, communication protocols and other reactive systems. A number of methods are known for the development of ...
Rita Dorofeeva, Nina Yevtushenko, Khaled El-Fakih,...
156
Voted
NIME
2001
Springer
126views Music» more  NIME 2001»
15 years 9 months ago
Problems and Prospects for Intimate Musical Control of Computers
In this paper we describe our efforts towards the development of live performance computer-based musical instrumentation. Our design criteria include initial ease of use coupled w...
David Wessel, Matthew Wright
ICPPW
1999
IEEE
15 years 9 months ago
Building Dynamic Multicast Trees in Mobile Networks
As group applications become more prevalent, efficient network utilization becomes a major concern. Multicast transmission may use network bandwidth more efficiently than multiple...
Frank Adelstein, Golden G. Richard III, Loren Schw...
ATAL
2006
Springer
15 years 7 months ago
SAgent: a security framework for JADE
This paper presents SAgent, a general-purpose mobile agent security framework that is designed to protect the computations of mobile agent applications in potentially hostile envi...
Vandana Gunupudi, Stephen R. Tate