Sciweavers

12289 search results - page 2393 / 2458
» computer 2006
Sort
View
125
Voted
IWCMC
2006
ACM
15 years 6 months ago
TARP: trust-aware routing protocol
Security is a critical issue in a mobile ad hoc network (MANET). In most of the previous protocols security is an added layer above the routing protocol. We propose a TrustAware R...
Loay Abusalah, Ashfaq A. Khokhar, G. BenBrahim, W....
86
Voted
IWCMC
2006
ACM
15 years 6 months ago
A joint technical and micro-economic investigation of pricing data services over wireless LANs
In this paper, we analyze a wireless LAN hot-spot, based on the IEEE 802.11b protocol, and more specifically we address the issue of defining proper pricing strategies, from bot...
Leonardo Badia, Federico Rodaro, Michele Zorzi
101
Voted
IWCMC
2006
ACM
15 years 6 months ago
Titan: a new paradigm in wireless internet access based on community collaboration
This paper introduces project TITAN, which investigates an alternative construct of residential broadband access. The aim of the project is to increase the utilisation of deployed...
Björn Landfeldt, Jahan Hassan, Albert Y. Zoma...
126
Voted
IWCMC
2006
ACM
15 years 6 months ago
Cross-layer performance analysis of joint rate and power adaptation schemes with multiple-user contention in Nakagami fading cha
Adaptively adjusting transmission rate and power to concurrently enhance goodput and save energy is an important issue in the wireless local area network (WLAN). However, goodput ...
Li-Chun Wang, Kuang-Nan Yen, Jane-Hwa Huang, Ander...
IWRIDL
2006
ACM
141views Education» more  IWRIDL 2006»
15 years 6 months ago
Shallow syntax analysis in Sanskrit guided by semantic nets constraints
We present the state of the art of a computational platform for the analysis of classical Sanskrit. The platform comprises modules for phonology, morphology, segmentation and shal...
Gérard P. Huet
« Prev « First page 2393 / 2458 Last » Next »