Sciweavers

3793 search results - page 585 / 759
» The wireless synchronization problem
Sort
View
124
Voted
ACMSE
2006
ACM
15 years 9 months ago
Security issues in privacy and key management protocols of IEEE 802.16
Without physical boundaries, a wireless network faces many more security threats than a wired network does. Therefore, in the IEEE 802.16 standard a security sublayer is specified...
Sen Xu, Manton M. Matthews, Chin-Tser Huang
164
Voted
MOBICOM
2006
ACM
15 years 9 months ago
Boundary recognition in sensor networks by topological methods
Wireless sensor networks are tightly associated with the underlying environment in which the sensors are deployed. The global topology of the network is of great importance to bot...
Yue Wang, Jie Gao, Joseph S. B. Mitchell
154
Voted
MOBICOM
2006
ACM
15 years 9 months ago
Low-cost communication for rural internet kiosks using mechanical backhaul
Rural kiosks in developing countries provide a variety of services such as birth, marriage, and death certificates, electricity bill collection, land records, email services, and...
Aaditeshwar Seth, D. Kroeker, Matei A. Zaharia, Sh...
121
Voted
INFOCOM
2005
IEEE
15 years 9 months ago
Provably competitive adaptive routing
Abstract— An ad hoc wireless network is an autonomous selforganizing system of mobile nodes connected by wireless links where nodes not in direct range communicate via intermedia...
Baruch Awerbuch, David Holmer, Herbert Rubens, Rob...
145
Voted
WWIC
2005
Springer
197views Communications» more  WWIC 2005»
15 years 9 months ago
Reducing Memory Fragmentation with Performance-Optimized Dynamic Memory Allocators in Network Applications
The needs for run-time data storage in modern wired and wireless network applications are increasing. Additionally, the nature of these applications is very dynamic, resulting in ...
Stylianos Mamagkakis, Christos Baloukas, David Ati...