Sciweavers

105 search results - page 19 / 21
» On the Use of Nodes with Controllable Mobility for Conservin...
Sort
View
SASN
2005
ACM
14 years 2 months ago
On the security of group communication schemes based on symmetric key cryptosystems
Many emerging applications in both wired and wireless networks, such as information dissemination and distributed collaboration in an adversarial environment, need support of secu...
Shouhuai Xu
IAJIT
2007
150views more  IAJIT 2007»
13 years 8 months ago
Fuzzy Active Queue Management for Congestion Control in Wireless Ad-Hoc
: Mobile ad-hoc network is a network without infrastructure where every node has its own protocols and services for powerful cooperation in the network. Every node also has the abi...
Essam Natsheh, Adznan B. Jantan, Sabira Khatun, Su...
ACSC
2004
IEEE
14 years 9 days ago
Kerberos Assisted Authentication in Mobile Ad-hoc Networks
An ad-hoc network comprises mobile nodes that cooperate with each other using wireless connections to route both data and control packets within the network. As the low transmissi...
Asad Amir Pirzada, Chris McDonald
NOSSDAV
2011
Springer
12 years 11 months ago
A measurement study of resource utilization in internet mobile streaming
The pervasive usage of mobile devices and wireless networking support have enabled more and more Internet streaming services to all kinds of heterogeneous mobile devices. However,...
Yao Liu, Fei Li, Lei Guo, Songqing Chen
JMS
2008
83views more  JMS 2008»
13 years 8 months ago
Monitoring of Physiological Parameters from Multiple Patients Using Wireless Sensor Network
This paper presents a wireless sensor network system that has the capability to monitor physiological parameters from multiple patient bodies. The system uses the Medical Implant C...
Mehmet R. Yuce, Peng Choong Ng, Jamil Y. Khan