Sciweavers

334 search results - page 54 / 67
» Controlled Delegation Protocol in Mobile RFID Networks
Sort
View
ESORICS
2000
Springer
13 years 11 months ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud
ICT
2004
Springer
127views Communications» more  ICT 2004»
14 years 28 days ago
An Interference Avoidance Technique for Ad Hoc Networks Employing Array Antennas
Array antennas have the potential to increase the capacity of wireless networks, but a distributed beamforming algorithm for maximizing the capacity in asynchronous, decentralized ...
T. Hunziker, Jacir Luiz Bordim, T. Ohira, Shinsuke...
CORR
2010
Springer
299views Education» more  CORR 2010»
13 years 7 months ago
A New Energy Efficient Routing Algorithm Based on a New Cost Function in Wireless Ad hoc Networks
Wireless ad hoc networks are power constrained since nodes operate with limited battery energy. Thus, energy consumption is crucial in the design of new ad hoc routing protocols. I...
Mehdi Lotfi, Sam Jabbehdari, Majid Asadi Shahmirza...
INFOCOM
2008
IEEE
14 years 1 months ago
An Empirical Activity Model for WLAN Users
Abstract—Understanding user behavior in wireless environments is useful for a variety of reasons ranging from the design of better sleep algorithms for components of mobile devic...
Caleb T. Phillips, Suresh Singh
ICDCSW
2005
IEEE
14 years 1 months ago
Parallel Bindings in Distributed Multimedia Systems
Today’s multimedia environments are characterized by different stationary and a growing number of mobile devices, like PDAs or even mobile phones. To meet their requirements reg...
Michael Repplinger, Florian Winter, Marco Lohse, P...