Sciweavers

448 search results - page 73 / 90
» Playing With Population Protocols
Sort
View
ICON
2007
IEEE
14 years 2 months ago
A Location-aware Key Predistribution Scheme for Distributed Wireless Sensor Networks
Key establishment plays a central role in authentication and encryption in wireless sensor networks, especially when they are mainly deployed in hostile environments. Because of th...
Ngo Trong Canh, Tran Van Phuong, Young-Koo Lee, Su...
INFOCOM
2007
IEEE
14 years 2 months ago
Malicious Users in Unstructured Networks
—Unstructured networks (like ad-hoc or peer-to-peer networks) are networks without centralized control of their operation. Users make local decisions regarding whether to follow ...
George Theodorakopoulos, John S. Baras
EUC
2007
Springer
14 years 2 months ago
Evaluating Mobility Support in ZigBee Networks
Abstract. The deployment of ZigBee networks is expected to facilitate numerous applications, such as home healthcare, medical monitoring, consumer electronics, and environmental se...
Tony Sun, Nia-Chiang Liang, Ling-Jyh Chen, Ping-Ch...
INFOCOM
2006
IEEE
14 years 2 months ago
BiToS: Enhancing BitTorrent for Supporting Streaming Applications
— BitTorrent (BT) in the last years has been one of the most effective mechanisms for P2P content distribution. Although BT was created for distribution of time insensitive conte...
Aggelos Vlavianos, Marios Iliofotou, Michalis Falo...
VTC
2006
IEEE
152views Communications» more  VTC 2006»
14 years 2 months ago
Cross-Layer Interaction Between TCP and UMTS RRM Scheduling Strategies
— In the third generation wireless system UMTS, Radio Resource Management (RRM) functions should encompass scheduling algorithms. In particular, scheduling mechanisms play a key ...
Juan Rendón, Anna Sfairopoulou, Ramon Ferr&...