Sciweavers

1030 search results - page 133 / 206
» Protocols Using Anonymous Connections: Mobile Applications
Sort
View
INFOCOM
2011
IEEE
14 years 7 months ago
WiZi-Cloud: Application-transparent dual ZigBee-WiFi radios for low power internet access
Abstract—The high density of WiFi Access Points and large unlicensed RF bandwidth over which they operate makes them good candidates to alleviate cellular network’s limitations...
Tao Jin, Guevara Noubir, Bo Sheng
ACSC
2004
IEEE
15 years 7 months ago
Kerberos Assisted Authentication in Mobile Ad-hoc Networks
An ad-hoc network comprises mobile nodes that cooperate with each other using wireless connections to route both data and control packets within the network. As the low transmissi...
Asad Amir Pirzada, Chris McDonald
TMC
2008
156views more  TMC 2008»
15 years 3 months ago
Rendezvous Planning in Wireless Sensor Networks with Mobile Elements
Recent research shows that significant energy saving can be achieved in wireless sensor networks by using mobile elements (MEs) capable of carrying data mechanically. However, the ...
Guoliang Xing, Tian Wang, Zhihui Xie, Weijia Jia
CIC
2006
140views Communications» more  CIC 2006»
15 years 5 months ago
An Efficient Update Algorithm for Supporting Mobility in Structured P2P Systems
Structured peer to peer (P2P) systems organize a large number of nodes in well-defined structures and provide efficient and scalable search functionalities. They have been used as ...
Boxuan Gu, Hu Wang, Zongming Fei
SIGSOFT
2004
ACM
15 years 9 months ago
Engineering human trust in mobile system collaborations
Rapid advances in wireless networking technologies have enabled mobile devices to be connected anywhere and anytime. While roaming, applications on these devices dynamically disco...
Licia Capra