Sciweavers

88 search results - page 15 / 18
» cn 2004
Sort
View
CN
2004
109views more  CN 2004»
14 years 10 months ago
Architectures and protocols for mobile computing applications: a reconfigurable approach
This work deals with reconfigurable control functions and protocols for supporting mobile computing applications in heterogeneous wireless systems like cellular networks and WLANs...
Carla-Fabiana Chiasserini, Francesca Cuomo, Leonar...
CN
2004
104views more  CN 2004»
14 years 10 months ago
Reducing power consumption and enhancing performance by direct slave-to-slave and group communication in Bluetooth WPANs
Bluetooth is a promising wireless technology aiming at supporting electronic devices to be instantly interconnected into short-range ad hoc networks. The Bluetooth medium access c...
Carlos de M. Cordeiro, Sachin Abhyankar, Dharma P....
CN
2004
129views more  CN 2004»
14 years 10 months ago
Measuring normality in HTTP traffic for anomaly-based intrusion detection
In this paper, the problem of measuring normality in HTTP traffic for the purpose of anomaly-based network intrusion detection is addressed. The work carried out is expressed in t...
Juan M. Estévez-Tapiador, Pedro Garcia-Teod...
CN
2004
122views more  CN 2004»
14 years 10 months ago
Group rekeying with limited unicast recovery
In secure group communications, a key server can deliver a "grouporiented" rekey message [22] to a large number of users efficiently using multicast. For reliable delive...
X. Brian Zhang, Simon S. Lam, Dong-Young Lee
73
Voted
CN
2002
89views more  CN 2002»
14 years 10 months ago
Measurement-based replanning of cell capacities in GSM networks
Due to the scarcity of the spectral resources and mobility of the portables, the call attempts may be blocked during call initiation or terminated during the hand-off process. Whe...
Ertan Onur, Hakan Deliç, Cem Ersoy, M. Ufuk...