Sciweavers

2722 search results - page 90 / 545
» Hastily formed networks
Sort
View
NCA
2005
IEEE
14 years 3 months ago
Leveraging the Multiprocessing Capabilities of Modern Network Processors for Cryptographic Acceleration
The Kasumi block cipher provides integrity and confidentiality services for 3G wireless networks, but it also forms a bottleneck due to its computational overhead. Especially in ...
Gunnar Gaubatz, Berk Sunar
GCC
2005
Springer
14 years 3 months ago
An Efficient Network Information Model Using NWS for Grid Computing Environments
Grid computing technologies enable large-scale aggregation and sharing of resources via wide-area networks focused on sharing computational, data, and other resources to form gener...
Chao-Tung Yang, Po-Chi Shih, Sung-Yi Chen, Wen-Chu...
ICCSA
2004
Springer
14 years 3 months ago
A Cluster Based Hierarchical Routing Protocol for Mobile Networks
We propose a hierarchical, cluster based semi-distributed routing protocol for a mobile ad hoc network. The network graph is partitioned into clusters using heuristics and the shor...
Kayhan Erciyes, Geoffrey Marshall
MWCN
2004
Springer
14 years 3 months ago
Energy-Efficient Multimedia Communications in Lossy Multi-Hop Wireless Networks
Abstract A key concern in multi-hop wireless networks is energy-efficiency due to batterypower constrained mobile nodes. The network interface is a significant consumer of energy...
Albert F. Harris III, Cigdem Sengul, Robin Kravets...
SAINT
2003
IEEE
14 years 3 months ago
Distributed Authentication for Peer-to-Peer Networks
A public key infrastructure is generally (and effectively) used for cryptographically secure authentication in the networks. Ad-hoc networks are formed in haphazard manner. Securi...
Shardul Gokhale, Partha Dasgupta