Sciweavers

1315 search results - page 229 / 263
» Providing Service Continuity in Ad Hoc Networks
Sort
View
SIGMOD
2011
ACM
170views Database» more  SIGMOD 2011»
12 years 11 months ago
Warding off the dangers of data corruption with amulet
Occasional corruption of stored data is an unfortunate byproduct of the complexity of modern systems. Hardware errors, software bugs, and mistakes by human administrators can corr...
Nedyalko Borisov, Shivnath Babu, NagaPramod Mandag...
WCNC
2008
IEEE
14 years 3 months ago
A Location Privacy Preserving Authentication Scheme in Vehicular Networks
Abstract—As an emerging application scenario of wireless technologies, vehicular communications have been initiated not only for enhancing the transportation safety and driving e...
Chenxi Zhang, Rongxing Lu, Pin-Han Ho, Anyi Chen
SASN
2005
ACM
14 years 2 months ago
On the security of group communication schemes based on symmetric key cryptosystems
Many emerging applications in both wired and wireless networks, such as information dissemination and distributed collaboration in an adversarial environment, need support of secu...
Shouhuai Xu
DSRT
2003
IEEE
14 years 2 months ago
Enabling Real-Time Distributed Virtual Simulation over the Internet Using Host-Based Overlay Multicast
Many-to-many multicast transmission is an essential network capability for scalable distributed simulation. The many open issues that make network-layer multicast impractical over...
Dennis M. Moen, J. Mark Pullen
EUROMICRO
2007
IEEE
14 years 3 months ago
A Light-Weight Implementation Scheme of the Tree Morphing Protocol for Mobile Multicast Sources
Multicast network services advantageously complement multimedia information and communication technologies, as they open up the realm for highly scalable multicustomer application...
Olaf Christ, Thomas C. Schmidt, Matthias Wähl...