Sciweavers

5499 search results - page 1015 / 1100
» Generalized Rewrite Theories
Sort
View
MMSEC
2004
ACM
104views Multimedia» more  MMSEC 2004»
14 years 4 months ago
Key-assignment strategies for CPPM
CSS, the first system to protect multimedia content on the new DVD medium failed badly, because both its encryption algorithm and its key management could easily be broken. A new ...
André Adelsbach, Jörg Schwenk
MOBICOM
2004
ACM
14 years 4 months ago
SPAWN: a swarming protocol for vehicular ad-hoc wireless networks
Future vehicular networks are expected to deploy shortrange communication technology for inter-vehicle communication. In addition to vehicle-to-vehicle communication, users will b...
Shirshanka Das, Alok Nandan, Giovanni Pau
MOBICOM
2004
ACM
14 years 4 months ago
FLSS: a fault-tolerant topology control algorithm for wireless networks
Topology control algorithms usually reduce the number of links in a wireless network, which in turn decreases the degree of connectivity. The resulting network topology is more su...
Ning Li, Jennifer C. Hou
MOBICOM
2004
ACM
14 years 4 months ago
Power conservation and quality of surveillance in target tracking sensor networks
Target tracking is an important application of wireless sensor networks. In this application, the sensor nodes collectively monitor and track the movement of an event or target ob...
Chao Gui, Prasant Mohapatra
MOBICOM
2004
ACM
14 years 4 months ago
A scalable model for channel access protocols in multihop ad hoc networks
A new modeling framework is introduced for the analytical study of medium access control (MAC) protocols operating in multihop ad hoc networks. The model takes into account the eï...
Marcelo M. Carvalho, Jose Joaquin Garcia-Luna-Acev...
« Prev « First page 1015 / 1100 Last » Next »