Sciweavers

2109 search results - page 385 / 422
» Multicast over wireless networks
Sort
View
167
Voted
CN
2004
109views more  CN 2004»
15 years 3 months ago
Architectures and protocols for mobile computing applications: a reconfigurable approach
This work deals with reconfigurable control functions and protocols for supporting mobile computing applications in heterogeneous wireless systems like cellular networks and WLANs...
Carla-Fabiana Chiasserini, Francesca Cuomo, Leonar...
125
Voted
PERCOM
2004
ACM
16 years 3 months ago
MediaBroker: An Architecture for Pervasive Computing
We present MediaBroker, a distributed framework designed to support pervasive computing applications. Specifically, we propose an architecture consisting of a transport engine and...
Martin Modahl, Ilya Bagrak, Matthew Wolenetz, Phil...
156
Voted
RTSS
2008
IEEE
15 years 10 months ago
Fast Sensor Placement Algorithms for Fusion-Based Target Detection
Mission-critical target detection imposes stringent performance requirements for wireless sensor networks, such as high detection probabilities and low false alarm rates. Data fus...
Zhaohui Yuan, Rui Tan, Guoliang Xing, Chenyang Lu,...
132
Voted
ISCC
2002
IEEE
111views Communications» more  ISCC 2002»
15 years 8 months ago
How to support Internet-based distribution of video on demand to portable devices
The increasing diffusion of mobile computing and of portable devices with wireless connectivity identifies new challenging scenarios for service provisioning. The access from devi...
Paolo Bellavista, Antonio Corradi
130
Voted
IJNSEC
2006
143views more  IJNSEC 2006»
15 years 3 months ago
Password Authentication Schemes: Current Status and Key Issues
Password authentication is one of the simplest and the most convenient authentication mechanisms to deal with secret data over insecure networks. It is more frequently required in...
Chwei-Shyong Tsai, Cheng-Chi Lee, Min-Shiang Hwang