Sciweavers

447 search results - page 51 / 90
» Mobile Secret Key Distribution with Network Coding
Sort
View
PDP
2005
IEEE
14 years 2 months ago
Rendezvous: An Alternative Approach to Conflict Resolution for Real Time Multi-User Applications
Up until now little support has been provided for shared state systems in environments with highly unpredictable network connections, such as mobile networks. Shared state conflic...
Angie Chandler, Joe Finney
IDMS
1999
Springer
117views Multimedia» more  IDMS 1999»
14 years 1 months ago
Tailoring Protocols for Dynamic Network Conditions and User Requirements
This paper shows the use of protocols dynamically generated for a particular network environment and an application’s requirements. We have developed a novel system called PNUT (...
R. De Silva, Aruna Seneviratne
ADHOC
2007
173views more  ADHOC 2007»
13 years 9 months ago
An adaptive transmission-scheduling protocol for mobile ad hoc networks
Transmission-scheduling protocols can support contention-free link-level broadcast transmissions and delay sensitive traffic in mobile, multiple-hop packet radio networks. Use of t...
Praveen K. Appani, Joseph L. Hammond, Daniel L. No...
DCOSS
2008
Springer
13 years 10 months ago
Automatic Collection of Fuel Prices from a Network of Mobile Cameras
Abstract. It is an undeniable fact that people want information. Unfortunately, even in today's highly automated society, a lot of the information we desire is still manually ...
Y. F. Dong, Salil S. Kanhere, Chun Tung Chou, Niru...
PUC
2006
139views more  PUC 2006»
13 years 8 months ago
EMMA: Epidemic Messaging Middleware for Ad hoc networks
The characteristics of mobile environments, with the possibility of frequent disconnections and fluctuating bandwidth, have forced a rethink of traditional middleware. In particula...
Mirco Musolesi, Cecilia Mascolo, Stephen Hailes