Sciweavers

1030 search results - page 201 / 206
» Protocols Using Anonymous Connections: Mobile Applications
Sort
View
CCS
2009
ACM
15 years 10 months ago
Hidden credential retrieval from a reusable password
We revisit the venerable question of access credentials management, which concerns the techniques that we, humans with limited memory, must employ to safeguard our various access ...
Xavier Boyen
RTSS
2009
IEEE
15 years 4 months ago
Cross-Layer Analysis of the End-to-End Delay Distribution in Wireless Sensor Networks
—Emerging applications of wireless sensor networks (WSNs) require real-time quality of service (QoS) guarantees to be provided by the network. However, designing real-time schedu...
Yunbo Wang, Mehmet C. Vuran, Steve Goddard
SIES
2008
IEEE
15 years 4 months ago
An investigation of the clique problem in FlexRay
—Distributed, time-triggered communication based on FlexRay is likely to become an enabler for future safety related applications in the automotive domain. Prior to series deploy...
Paul Milbredt, Martin Horauer, Andreas Steininger
INFOCOM
2012
IEEE
13 years 1 days ago
Approximate convex decomposition based localization in wireless sensor networks
—Accurate localization in wireless sensor networks is the foundation for many applications, such as geographic routing and position-aware data processing. An important research d...
Wenping Liu, Dan Wang, Hongbo Jiang, Wenyu Liu, Ch...
HIPC
2003
Springer
15 years 2 months ago
POMA: Prioritized Overlay Multicast in Ad Hoc Environments
Abstract: Overlay Multicast networks in mobile ad-hoc environments have received much attention due to their increasing number of practical applications. Although overlay multicast...
Abhishek P. Patil, Yunhao Liu, Lionel M. Ni, Li Xi...