Sciweavers

3486 search results - page 503 / 698
» System Design and Networking Protocols for Wireless Position...
Sort
View
JCST
2008
98views more  JCST 2008»
15 years 1 months ago
Probabilistic Adaptive Anonymous Authentication in Vehicular Networks
Vehicular networks have attracted extensive attention in recent years for their promises in improving safety and enabling other value-added services. Most previous work focuses on ...
Yong Xi, Kewei Sha, Weisong Shi, Loren Schwiebert,...
INFOCOM
2003
IEEE
15 years 7 months ago
A new TCP/AQM for Stable Operation in Fast Networks
—This paper is aimed at designing a congestion control system that scales gracefully with network capacity, providing high utilization, low queueing delay, dynamic stability, and...
Fernando Paganini, Zhikui Wang, Steven H. Low, Joh...
108
Voted
SIGCOMM
2009
ACM
15 years 8 months ago
Rapid service creation using the JUNOS SDK
The creation of services on IP networks is a lengthy process. The development time is further increased if this involves the equipment manufacturer adding third-party technology i...
James Kelly, Wladimir Araujo, Kallol Banerjee
110
Voted
CORR
2010
Springer
143views Education» more  CORR 2010»
15 years 1 months ago
Opportunistic Routing in Ad Hoc Networks: How many relays should there be? What rate should nodes use?
Opportunistic routing is a multi-hop routing scheme which allows for selection of the best immediately available relay. In blind opportunistic routing protocols, where transmitters...
Joseph Blomer, Nihar Jindal
145
Voted
PERCOM
2005
ACM
16 years 1 months ago
Security Parallels between People and Pervasive Devices
Unique and challenging security problems arise due to the scarcity of computational, storage, and power resources in the low-cost pervasive computing environment. Particularly rel...
Stephen A. Weis