Sciweavers

1394 search results - page 257 / 279
» Wireless Ad Hoc Podcasting
Sort
View
68
Voted
CNSR
2004
IEEE
15 years 1 months ago
Trusted Route Discovery with TORA Protocol
An ad-hoc network is formed when a group of wireless nodes pledge to help each other in passing packets based upon a pre-agreed protocol. Temporally Ordered Routing Algorithm (TOR...
Asad Amir Pirzada, Chris McDonald
CAMAD
2006
IEEE
15 years 1 months ago
Enhancing reliable multicast transport to mitigate the impact of blockage
Mobile wireless communication is susceptible to signal blockage, which is loss of signal, typically due to physical obstruction, over a longer duration relative to fading. Measurem...
Stephen F. Bush, Orhan C. Imer, Praveen Kumar Gopa...
ACNS
2008
Springer
96views Cryptology» more  ACNS 2008»
14 years 11 months ago
Efficient Device Pairing Using "Human-Comparable" Synchronized Audiovisual Patterns
Abstract. "Pairing" is referred to as the operation of achieving authenticated key agreement between two human-operated devices over a short- or medium-range wireless com...
Ramnath Prasad, Nitesh Saxena
ICASSP
2010
IEEE
14 years 9 months ago
Statistical modeling of co-channel interference in a field of Poisson distributed interferers
—With increasing spatial reuse of the radio spectrum, co-channel interference is becoming a dominant noise source and may severely degrade the communication performance of wirele...
Kapil Gulati, Brian L. Evans, Keith R. Tinsley
JCS
2007
84views more  JCS 2007»
14 years 9 months ago
On the security of group communication schemes
Many emerging applications in both wired and wireless networks need support of secure group communications. There have been many secure group communication schemes in the setting ...
Shouhuai Xu