Sciweavers

1259 search results - page 225 / 252
» An Efficient Mobile Authentication Scheme for Wireless Netwo...
Sort
View
TMC
2008
146views more  TMC 2008»
13 years 8 months ago
Cross-Layer Interaction of TCP and Ad Hoc Routing Protocols in Multihop IEEE 802.11 Networks
In this research, we first investigate the cross-layer interaction between TCP and routing protocols in the IEEE 802.11 ad hoc network. On-demand ad hoc routing protocols respond t...
Kitae Nahm, Ahmed Helmy, C. C. Jay Kuo
PERCOM
2007
ACM
14 years 8 months ago
Dual Ownership: Access Management for Shared Item Information in RFID-enabled Supply Chains
RFID tags combined with globally unique numbering schemes such as the Electronic Product Code (EPC) help standardizing the communication along the supply chain. Participants gener...
Alexander Ilic, Florian Michahelles, Elgar Fleisch
MOBIHOC
2001
ACM
14 years 8 months ago
Time synchronization in ad hoc networks
Ubiquitous computing environments are typically based upon ad hoc networks of mobile computing devices. These devices may be equipped with sensor hardware to sense the physical en...
Kay Römer
VTC
2007
IEEE
125views Communications» more  VTC 2007»
14 years 2 months ago
Channel Decoder Assisted Adaptive Coding and Modulation for HAP Communications
Provision of mobile broadband wireless access, for instance via high altitude platforms (HAPs) to the passengers on a high-speed train, requires the development of efficient and r...
Miha Smolnikar, Tomaz Javornik, Mihael Mohorcic
IJSNET
2008
118views more  IJSNET 2008»
13 years 8 months ago
A fuzzy-based virtual backbone routing for large-scale MANETs
: Virtual backbone-based routing is a promising approach for enhancing the routing efficiency in MANETs. To establish communication in the network, the virtual backbone nodes have ...
Wassim El-Hajj, Dionysios Kountanis, Ala I. Al-Fuq...