Sciweavers

2024 search results - page 338 / 405
» Providing Secure Environments for Untrusted Network Applicat...
Sort
View
DAIS
2006
15 years 5 months ago
Mobile Process Description and Execution
Abstract. Mobile devices are increasingly aware of their respective locations and vicinity and tend to communicate rather loosely with each other; therefore asynchronous communicat...
Christian P. Kunze, Sonja Zaplata, Winfried Lamers...
INFOCOM
2006
IEEE
15 years 10 months ago
Mobile Emulab: A Robotic Wireless and Sensor Network Testbed
Abstract— Simulation has been the dominant research methodology in wireless and sensor networking. When mobility is added, real-world experimentation is especially rare. However,...
David Johnson, Tim Stack, Russ Fish, Daniel Montra...
WCNC
2010
IEEE
15 years 8 months ago
Differentiable Spectrum Partition for Fractional Frequency Reuse in Multi-Cell OFDMA Networks
To mitigate inter-cell interference (ICI) and achieve higher spectrum efficiency, fractional frequency reuse (FFR) has been widely adopted by the next generation wireless systems...
Weihuang Fu, Zhifeng Tao, Jinyun Zhang, Dharma P. ...
ISCC
2005
IEEE
15 years 10 months ago
Towards Flexible Authorization Management
During the last years there have been a lot of proposals in the literature for systems that attempt to manage the process of trust establishment. However, the engineering details ...
Patroklos G. Argyroudis, Donal O'Mahony
APNOMS
2009
Springer
15 years 11 months ago
A Scheme for Supporting Optimal Path in 6LoWPAN Based MANEMO Networks
In this paper, we focus on the scheme for the route optimization in 6LoWPAN based MANEMO environments. If 6LoWPAN mobile routers for supporting NEMO protocol are organized by neste...
Jin Ho Kim, Choong Seon Hong