Sciweavers

93 search results - page 10 / 19
» A comparative analysis of groupware application protocols
Sort
View

Publication
117views
13 years 3 months ago
Design, Implementation, and Performance Analysis of DiscoSec–Service Pack for Securing WLANs
To improve the already tarnished reputation of WLAN security, the new IEEE 802.11i security standard provides means for an enhanced user authentication and strong data confidential...
Ivan Martinovic, Paul Pichota, Matthias Wilhelm, F...
SCN
2010
Springer
145views Communications» more  SCN 2010»
13 years 5 months ago
Distributed Private-Key Generators for Identity-Based Cryptography
An identity-based encryption (IBE) scheme can greatly reduce the complexity of sending encrypted messages. However, an IBE scheme necessarily requires a private-key generator (PKG)...
Aniket Kate, Ian Goldberg
ICC
2007
IEEE
128views Communications» more  ICC 2007»
14 years 1 months ago
Delay and Power Efficient Voice Transmission over MANET
: Increasing speed of hardware device and versatile functionalities of small equipments e.g. laptop, PDA etc. are introducing various voice oriented applications with mobility. Lik...
Md. Golam Kaosar, Tarek R. Sheltami, Ashraf S. Has...
VTC
2010
IEEE
164views Communications» more  VTC 2010»
13 years 5 months ago
Metrics for Performance Prediction of Wireless Sensor Networks
—We present the derivation of a novel metric for the performance prediction of Wireless Sensor Networks (WSNs). In particular, the metric can be applied in, for example, monitori...
Frank Oldewurtel, Petri Mähönen
JAVA
2001
Springer
13 years 12 months ago
Runtime optimizations for a Java DSM implementation
Jackal is a fine-grained distributed shared memory implementation of the Java programming language. Jackal implements Java’s memory model and allows multithreaded Java programs...
Ronald Veldema, Rutger F. H. Hofman, Raoul Bhoedja...