Sciweavers

402 search results - page 4 / 81
» Achieving privacy in mesh networks
Sort
View
FGCN
2007
IEEE
124views Communications» more  FGCN 2007»
14 years 2 months ago
2nd Generation Wireless Mesh Networks: Technical, Economical and Social Challenges
Abstract— Wireless mesh networks have the potential to provide ubiquitous high-speed Internet at low costs. The good news is that initial deployments of WiFi meshes show the feas...
Roger Karrer, Antonio Pescapè
NETWORKING
2004
13 years 9 months ago
A Case for Mesh-Tree-Interaction in End System Multicasting
Abstract. End System Multicasting (ESM) is fast becoming a feasible alternative to IP multicasting. ESM approaches can be broadly classified into two main categories: (i) Tree firs...
Anirban Chakrabarti, Govindarasu Manimaran
VTC
2007
IEEE
14 years 1 months ago
Time Behaviour and Network Encumbrance Due to Authentication in Wireless Mesh Access Networks
— In this paper we investigate the authentication behaviour of mobile nodes within wireless mesh access networks. This work evaluates the authentication time and the authenticati...
Andreas Roos, S. Wieland, A. Th. Schwarzbacher, Ba...
ADHOC
2007
159views more  ADHOC 2007»
13 years 7 months ago
Cross-layer adaptive control for wireless mesh networks
Abstract— This paper investigates optimal routing and adaptive scheduling in a wireless mesh network composed of mesh clients and mesh routers. The mesh clients are power constra...
Michael J. Neely, Rahul Urgaonkar
CCS
2004
ACM
14 years 1 months ago
On achieving software diversity for improved network security using distributed coloring algorithms
It is widely believed that diversity in operating systems, software packages, and hardware platforms will decrease the virulence of worms and the effectiveness of repeated applic...
Adam J. O'Donnell, Harish Sethu