Sciweavers

4596 search results - page 914 / 920
» Mobile Business Processes
Sort
View
ASAP
2010
IEEE
171views Hardware» more  ASAP 2010»
13 years 7 months ago
General-purpose FPGA platform for efficient encryption and hashing
Many applications require protection of secret or sensitive information, from sensor nodes and embedded applications to large distributed systems. The confidentiality of data can b...
Jakub Szefer, Yu-Yuan Chen, Ruby B. Lee
AHSWN
2008
163views more  AHSWN 2008»
13 years 7 months ago
Control Frame Shaping in Power Controlled and Directional MAC Protocols?
This paper discusses the ideal shapes of control frames (i.e., RTS/CTS frames) in the IEEE 802.11 MAC layer for efficient power control and directional beam forming in mobile ad h...
Fei Dai, Jie Wu
CORR
2010
Springer
99views Education» more  CORR 2010»
13 years 7 months ago
A New Phase Transition for Local Delays in MANETs
: We study a slotted version of the Aloha Medium Access (MAC) protocol in a Mobile Ad-hoc Network (MANET). Our model features transmitters randomly located in the Euclidean plane, ...
François Baccelli, Bartek Blaszczyszyn
CORR
2010
Springer
77views Education» more  CORR 2010»
13 years 7 months ago
Stochastic Analysis of Non-slotted Aloha in Wireless Ad-Hoc Networks
: In this paper we propose two analytically tractable stochastic models of non-slotted Aloha for Mobile Ad-hoc NETworks (MANETs): one model assumes a static pattern of nodes while ...
Bartek Blaszczyszyn, Paul Mühlethaler
ENTCS
2006
183views more  ENTCS 2006»
13 years 7 months ago
Metamodel-Based Model Transformation with Aspect-Oriented Constraints
Model transformation means converting an input model available at the beginning of the transformation process to an output model. A widely used approach to model transformation us...
László Lengyel, Tihamer Levendovszky...