Sciweavers

974 search results - page 186 / 195
» Energy-Delay Analysis of MAC Protocols in Wireless Networks
Sort
View
PERCOM
2005
ACM
14 years 8 months ago
Expose or Not? A Progressive Exposure Approach for Service Discovery in Pervasive Computing Environments
In pervasive computing environments, service discovery facilitates users to access network services by automating tedious manual configurations. When network services becomes perv...
Feng Zhu, Wei Zhu, Matt W. Mutka, Lionel M. Ni
ITIIS
2008
151views more  ITIIS 2008»
13 years 8 months ago
Bandwidth Management of WiMAX Systems and Performance Modeling
WiMAX has been introduced as a competitive alternative for metropolitan broadband wireless access technologies. It is connection oriented and it can provide very high data rates, ...
Yue Li, Jianhua He, Weixi Xing
CCS
2001
ACM
14 years 1 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
ADHOC
2008
88views more  ADHOC 2008»
13 years 8 months ago
Safari: A self-organizing, hierarchical architecture for scalable ad hoc networking
As wireless devices become more pervasive, mobile ad hoc networks are gaining importance, motivating the development of highly scalable ad hoc networking techniques. In this paper...
Shu Du, Ahamed Khan, Santashil PalChaudhuri, Ansle...
INFOCOM
2005
IEEE
14 years 2 months ago
Multicast capacity of packet-switched ring WDM networks
Packet-switched unidirectional and bidirectional ring wavelength division multiplexing (WDM) networks with destination stripping provide an increased capacity due to spatial wavel...
Michael Scheutzow, Patrick Seeling, Martin Maier, ...