Sciweavers

3712 search results - page 584 / 743
» Role-Based Access Control
Sort
View
152
Voted
MOBIHOC
2004
ACM
15 years 7 months ago
Multi-channel mac for ad hoc networks: handling multi-channel hidden terminals using a single transceiver
This paper proposes a medium access control (MAC) protocol for ad hoc wireless networks that utilizes multiple channels dynamically to improve performance. The IEEE 802.11 standar...
Jungmin So, Nitin H. Vaidya
129
Voted
PEWASUN
2004
ACM
15 years 7 months ago
Multipath routing and multiple description coding in ad-hoc networks: a simulation study
The nature of ad hoc networks makes it a challenge to offer connections with an assured quality. In order to improve the performance of the network, multipath routing in combinati...
Irene Fernández Díaz, Dick H. J. Epe...
SIGUCCS
2004
ACM
15 years 7 months ago
Software's little helpers: managing your lab areas
There are always more labs and other things to attend to than available bodies to watch over said pesky details. How can we keep an eye on the ever-present large and small events ...
Doug Simpson
WS
2004
ACM
15 years 7 months ago
Security considerations for IEEE 802.15.4 networks
The IEEE 802.15.4 specification outlines a new class of wireless radios and protocols targeted at low power devices, personal area networks, and sensor nodes. The specification ...
Naveen Sastry, David Wagner
ACNS
2004
Springer
77views Cryptology» more  ACNS 2004»
15 years 7 months ago
A Pay-per-Use DoS Protection Mechanism for the Web
Internet service providers have resisted deploying Denial-of-Service (DoS) protection mechanisms despite numerous research results in the area. This is so primarily because ISPs ca...
Angelos Stavrou, John Ioannidis, Angelos D. Keromy...