Sciweavers

1030 search results - page 69 / 206
» Protocols Using Anonymous Connections: Mobile Applications
Sort
View
MOBIHOC
2006
ACM
15 years 9 months ago
Performance analysis of mobility-assisted routing
Traditionally, ad hoc networks have been viewed as a connected graph over which end-to-end routing paths had to be established. Mobility was considered a necessary evil that inval...
Thrasyvoulos Spyropoulos, Konstantinos Psounis, Ca...
MOBICOM
1996
ACM
15 years 1 months ago
Security on the Move: Indirect Authentication using Kerberos
Even as mobile computing and network computing are gaining momentum, Internet security is sharing the spotlight. Security and authentication on open networks is already a difficul...
Armando Fox, Steven D. Gribble
TMC
2008
136views more  TMC 2008»
14 years 9 months ago
Efficient Resource Allocation for Wireless Multicast
In this paper, we propose a bandwidth-efficient multicast mechanism for heterogeneous wireless networks. We reduce the bandwidth cost of an Internet Protocol (IP) multicast tree by...
De-Nian Yang, Ming-Syan Chen
CONEXT
2005
ACM
14 years 11 months ago
Root cause analysis for long-lived TCP connections
While the applications using the Internet have changed over time, TCP is still the dominating transport protocol that carries over 90% of the total traffic. Throughput is the key...
Matti Siekkinen, Guillaume Urvoy-Keller, Ernst W. ...
MOBISYS
2004
ACM
15 years 9 months ago
Bluetooth and WAP Push Based Location-Aware Mobile Advertising System
Advertising on mobile devices has large potential due to the very personal and intimate nature of the devices and high targeting possibilities. We introduce a novel B-MAD system f...
Lauri Aalto, Nicklas Göthlin, Jani Korhonen, ...