Sciweavers

2362 search results - page 465 / 473
» The wireless network jamming problem
Sort
View
MIDDLEWARE
2007
Springer
15 years 5 months ago
Domain-based context management for dynamic and evolutionary environments
Research in context-aware computing has produced a number of application prototypes, frameworks, middlewares and models for describing context. However, development of ubiquitous ...
Ricardo Couto Antunes da Rocha, Markus Endler
MOBICOM
1996
ACM
15 years 3 months ago
Security on the Move: Indirect Authentication using Kerberos
Even as mobile computing and network computing are gaining momentum, Internet security is sharing the spotlight. Security and authentication on open networks is already a difficul...
Armando Fox, Steven D. Gribble
ADHOC
2005
95views more  ADHOC 2005»
14 years 11 months ago
Planar graph routing on geographical clusters
Geographic routing protocols base their forwarding decisions on the location of the current device, its neighbors, and the packets destination. Early proposed heuristic greedy rou...
Hannes Frey, Daniel Görgen
INFOCOM
2010
IEEE
14 years 10 months ago
Neighbor Discovery with Reception Status Feedback to Transmitters
—Neighbor discovery is essential for the process of self-organization of a wireless network, where almost all routing and medium access protocols need knowledge of one-hop neighb...
Ramin Khalili, Dennis Goeckel, Donald F. Towsley, ...
ICUIMC
2011
ACM
14 years 3 months ago
Opportunities of MIM capture in IEEE 802.11 WLANs: analytic study
Physical layer capture in WLANs makes a receiver to decode a relatively strong packet in a collision. According to recent works, an augmented physical layer capture handles interf...
Joonsoo Lee, Young-myoung Kang, Suchul Lee, Chong-...