Sciweavers

211 search results - page 30 / 43
» Identity-Based Access Control for Ad Hoc Groups
Sort
View
NETWORKING
2004
13 years 9 months ago
Performance of Directional Collision Avoidance in Ad Hoc Networks
Abstract. This paper analyzes the performance of directional collision avoidance schemes, in which antenna systems are used to direct the transmission and reception of control and ...
Yu Wang 0007, J. J. Garcia-Luna-Aceves
BROADNETS
2006
IEEE
14 years 1 months ago
CAM-MAC: A Cooperative Asynchronous Multi-Channel MAC Protocol for Ad Hoc Networks
— Medium access control (MAC) protocols have been studied under different contexts for several years now. In all these MAC protocols, nodes make independent decisions on when to ...
Tie Luo, Mehul Motani, Vikram Srinivasan
IDEAS
2005
IEEE
113views Database» more  IDEAS 2005»
14 years 1 months ago
Fine-Granularity Access Control in 3-Tier Laboratory Information Systems
Laboratory information systems (LIMS) are used in life science research to manage complex experiments. Since LIMS systems are often shared by different research groups, powerful a...
Xueli Li, Nomair A. Naeem, Bettina Kemme
ECUMN
2007
Springer
14 years 1 months ago
Modeling and Analysis of Energy Consumption in IEEE802.11e Networks
Energy is a major concern in wireless networks, be it for the target mobile user, as is the case of IEEE802.11 Infrastructure mode, or for all the users as in IEEE802.11 ad hoc mo...
Olfa Bouattay, Tijani Chahed, Mounir Frikha, Sami ...
BIOWIRE
2007
Springer
14 years 1 months ago
Epcast: Controlled Dissemination in Human-Based Wireless Networks Using Epidemic Spreading Models
Epidemics-inspired techniques have received huge attention in recent years from the distributed systems and networking communities. These algorithms and protocols rely on probabili...
Salvatore Scellato, Cecilia Mascolo, Mirco Musoles...