Sciweavers

457 search results - page 89 / 92
» Large Deviations of the Interference in a Wireless Communica...
Sort
View
MMB
2010
Springer
194views Communications» more  MMB 2010»
14 years 8 days ago
Searching for Tight Performance Bounds in Feed-Forward Networks
Abstract. Computing tight performance bounds in feed-forward networks under general assumptions about arrival and server models has turned out to be a challenging problem. Recently...
Andreas Kiefer, Nicos Gollan, Jens B. Schmitt
MOBIHOC
2006
ACM
14 years 7 months ago
An evaluation of inter-vehicle ad hoc networks based on realistic vehicular traces
Vehicular ad hoc networks (VANETs) using WLAN technology have recently received considerable attention. The evaluation of VANET routing protocols often involves simulators since m...
Valery Naumov, Rainer Baumann, Thomas R. Gross
MM
2005
ACM
93views Multimedia» more  MM 2005»
14 years 1 months ago
The multimedia challenges raised by pervasive games
Pervasive gaming is a new form of multimedia entertainment that extends the traditional computer gaming experience out into the real world. Through a combination of personal devic...
Mauricio Capra, Milena Radenkovic, Steve Benford, ...
MWCN
2004
Springer
14 years 26 days ago
Enabling Energy Demand Response with Vehicular Mesh Networks
Inter-vehicle communication is becoming increasingly important in recent years. Traditional research efforts on vehicular networks have been put into safety or infotainment applica...
Howard CheHao Chang, Haining Du, Joey Anda, Chen-N...
CISC
2005
Springer
169views Cryptology» more  CISC 2005»
14 years 1 months ago
On Bluetooth Repairing: Key Agreement Based on Symmetric-Key Cryptography
Abstract. Despite many good (secure) key agreement protocols based on publickey cryptography exist, secure associations between two wireless devices are often established using sym...
Serge Vaudenay