Sciweavers

4985 search results - page 154 / 997
» Re-Configurable Computing in Wireless
Sort
View
171
Voted
WISEC
2010
ACM
15 years 8 months ago
Secret keys from entangled sensor motes: implementation and analysis
Key management in wireless sensor networks does not only face typical, but also several new challenges. The scale, resource limitations, and new threats such as node capture and c...
Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt
128
Voted
MOBIHOC
2008
ACM
16 years 3 months ago
BEND: MAC-layer proactive mixing protocol for network coding in multi-hop wireless networks
We present BEND, a MAC layer solution to practical network coding in multi-hop wireless networks. It is the first exploration of the broadcasting nature of wireless channels to pr...
Jian Zhang
152
Voted
DIALM
2005
ACM
130views Algorithms» more  DIALM 2005»
15 years 5 months ago
On lower bounds for MAC layer contention in CSMA/CA-based wireless networks
Wireless LANs operating within unlicensed frequency bands require random access schemes such as CSMA/CA, so that wireless networks from different administrative domains (for exam...
Frank A. Zdarsky, Ivan Martinovic, Jens B. Schmitt
147
Voted
MOBISYS
2008
ACM
16 years 3 months ago
Micro power management of active 802.11 interfaces
Wireless interfaces are major power consumers on mobile systems. Considerable research has improved the energy efficiency of elongated idle periods or created more elongated idle ...
Jiayang Liu, Lin Zhong
175
Voted
SAC
2006
ACM
15 years 3 months ago
Editorial message: special track on ubiquitous computing
Ubiquitous computing places humans in the center of environments saturated with computing and wireless communications capabilities, yet gracefully integrated, so that technology r...
Achilles Kameas, George Roussos