Sciweavers

334 search results - page 22 / 67
» Controlled Delegation Protocol in Mobile RFID Networks
Sort
View
HUMAN
2003
Springer
14 years 23 days ago
A Graph-Based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks
Multipath on-demand routing protocols for mobile ad hoc networks try to reduce control overhead and end-to-end delay by computing multiple paths with a single route discovery proce...
Gunyoung Koh, Duyoung Oh, Heekyoung Woo
TWC
2008
112views more  TWC 2008»
13 years 7 months ago
Throughput Analysis of TCP-Friendly Rate Control in Mobile Hotspots
By integrating wireless wide area networks (WWANs) and wireless local area networks (WLANs), mobile hotspot technologies enable seamless Internet multimedia services to users on-bo...
Sangheon Pack, Xuemin Shen, Jon W. Mark, Lin Cai
ESAS
2007
Springer
14 years 1 months ago
Authenticating DSR Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences
The problem of secure routing in mobile ad hoc networks is long-standing and has been extensively studied by researchers. Recently, techniques of aggregating signatures have been a...
Saikat Chakrabarti 0002, Santosh Chandrasekhar, Mu...
ICNP
1998
IEEE
13 years 11 months ago
Applying MSTDM to Packet Voice and Data in Cellular Radio Systems
MSTDM is a variant of the Ethernet protocol that provides quality of service guarantees for voice. This protocol has been applied to LAN's and CATV networks. Cellular network...
Nicholas F. Maxemchuk
BIOWIRE
2007
Springer
14 years 1 months ago
Epcast: Controlled Dissemination in Human-Based Wireless Networks Using Epidemic Spreading Models
Epidemics-inspired techniques have received huge attention in recent years from the distributed systems and networking communities. These algorithms and protocols rely on probabili...
Salvatore Scellato, Cecilia Mascolo, Mirco Musoles...