Sciweavers

1030 search results - page 106 / 206
» Protocols Using Anonymous Connections: Mobile Applications
Sort
View
MOBIHOC
2010
ACM
15 years 1 months ago
Barrier coverage with sensors of limited mobility
Barrier coverage is a critical issue in wireless sensor networks for various battlefield and homeland security applications. The goal is to effectively detect intruders that attem...
Anwar Saipulla, Benyuan Liu, Guoliang Xing, Xinwen...
PERCOM
2010
ACM
15 years 2 months ago
Measuring mobile phone energy consumption for 802.11 wireless networking
The complexity of modern mobile phones makes it difficult for developers to understand the power consumption of their applications. Our measurement framework produces fine-graine...
Andrew Colin Rice, Simon Hay
JCM
2006
126views more  JCM 2006»
15 years 4 months ago
A Multicast Transport Protocol Design Methodology: Analysis, Implementation and Performance Evaluation
In this paper, we propose and analyze a multicast application called SOMA (SynchrOnous Multicast Application) which offers multicast file transfer service in an asymmetric intra-ca...
Pilar Manzanares-Lopez, Juan Carlos Sanchez-Aarnou...
SP
2007
IEEE
120views Security Privacy» more  SP 2007»
15 years 10 months ago
Endorsed E-Cash
An electronic cash (e-cash) scheme lets a user withdraw money from a bank and then spend it anonymously. E-cash can be used only if it can be securely and fairly exchanged for ele...
Jan Camenisch, Anna Lysyanskaya, Mira Meyerovich
NBIS
2007
Springer
15 years 10 months ago
A Ring Infrastructure for Neighbor-Centric Peer-to-Peer Applications
We propose a peer-to-peer system that supports distributed virtual world applications. For these applications, the connections between directly neighboring peers are of the utmost ...
Oliver Haase, Alfred Toth, Jürgen Wäsch