Sciweavers

820 search results - page 109 / 164
» Protocols for Asymmetric Communication Channels
Sort
View
VTC
2006
IEEE
152views Communications» more  VTC 2006»
15 years 4 months ago
Cross-Layer Interaction Between TCP and UMTS RRM Scheduling Strategies
— In the third generation wireless system UMTS, Radio Resource Management (RRM) functions should encompass scheduling algorithms. In particular, scheduling mechanisms play a key ...
Juan Rendón, Anna Sfairopoulou, Ramon Ferr&...
VTC
2006
IEEE
142views Communications» more  VTC 2006»
15 years 4 months ago
Payload Length and Rate Adaptation for Throughput Optimization in Wireless LANs
— Wireless local area networks offer a range of transmitted data rates that are to be selected according to estimated channel conditions. However, due to packet overheads and con...
Sayantan Choudhury, Jerry D. Gibson
FC
2004
Springer
94views Cryptology» more  FC 2004»
15 years 3 months ago
The Ephemeral Pairing Problem
Abstract In wireless ad-hoc broadcast networks the pairing problem consists of establishing a (long-term) connection between two specific physical nodes in the network that do not...
Jaap-Henk Hoepman
CCS
2008
ACM
14 years 12 months ago
Provably secure browser-based user-aware mutual authentication over TLS
The standard solution for user authentication on the Web is to establish a TLS-based secure channel in server authenticated mode and run a protocol on top of TLS where the user en...
Sebastian Gajek, Mark Manulis, Ahmad-Reza Sadeghi,...
WICON
2008
14 years 11 months ago
A graph based routing algorithm for multi-hop cognitive radio networks
Cognitive radio networks that allow dynamic spectrum access are considered spectrally more efficient than networks using fixed spectral allocation. These networks are characterize...
Yogesh Reddy Kondareddy, Prathima Agrawal