Sciweavers

2200 search results - page 42 / 440
» Hop Integrity in Computer Networks
Sort
View
ADHOC
2007
130views more  ADHOC 2007»
13 years 7 months ago
Implementation of security policy for clinical information systems over wireless sensor networks
Various healthcare areas such as diagnosis, surgery, intensive care and treatment, and patient monitoring in general, would greatly benefit from light, autonomous devices which c...
Jelena V. Misic, Vojislav B. Misic
ICOIN
2001
Springer
14 years 1 days ago
A Study of Flow-Based Traffic Admission Control Algorithm in the ATM-Based MPLS Network
This paper presents the Differentiated Services (DiffServ) over ATM based Multiprotocol Label Switching (MPLS) core network architecture. This network supports the Integrated Serv...
Gyu Myoung Lee, Jun Kyun Choi
PERCOM
2010
ACM
13 years 6 months ago
Towards the adaptive integration of multiple context reasoners in pervasive computing environments
Abstract—The pervasive computing vision consists in realizing ubiquitous technologies to support the execution of people’s everyday tasks by proactively providing appropriate i...
Daniele Riboni, Linda Pareschi, Claudio Bettini
MAGS
2007
117views more  MAGS 2007»
13 years 7 months ago
Organization detection for dynamic load balancing in individual-based simulations
Large-scale individual-based simulations can benefit a lot from high performance computing environments. The benefit that can be hopped depends greatly on a good load distributi...
Cyrille Bertelle, Antoine Dutot, Fréd&eacut...
MOBIHOC
2009
ACM
14 years 8 months ago
Efficient uncoordinated FHSS anti-jamming communication
We address the problem of jamming-resistant communication in scenarios in which the communicating parties do not share secret keys. This includes scenarios where the communicating...
Mario Strasser, Christina Pöpper, Srdjan Capk...