Sciweavers

2691 search results - page 446 / 539
» Security in Ad Hoc Networks
Sort
View
NDSS
2005
IEEE
14 years 3 months ago
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage
In 1998, Blaze, Bleumer, and Strauss proposed an application called atomic proxy re-encryption, in which a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for...
Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan ...
MOBIHOC
2003
ACM
14 years 9 months ago
ATP: a reliable transport protocol for ad-hoc networks
Existing works have approached the problem of reliable transport in ad-hoc networks by proposing mechanisms to improve TCP's performance over such networks. In this paper we ...
Karthikeyan Sundaresan, Vaidyanathan Anantharaman,...
GLOBECOM
2006
IEEE
14 years 4 months ago
Adaptive Network Resource Management in IEEE 802.11 Wireless Random Access MAC
— Effective and efficient management of wireless network resources is attracting more and more research attention, due to the rapid growing deployment of wireless mesh and ad hoc...
Hao Wang, Changcheng Huang, James Yan
TNC
2004
140views Education» more  TNC 2004»
13 years 11 months ago
Seamless Multimedia Communications in Heterogeneous Mobile Access Networks
With the advent of the new wireless technologies allowing for higher data rates, the provision of high quality multimedia services over the upcoming wireless and mobile networks i...
Pedro M. Ruiz, Juan A. Botía, Antonio F. G&...
ICCV
2001
IEEE
14 years 12 months ago
Continuous Global Evidence-Based Bayesian Modality Fusion for Simultaneous Tracking of Multiple Objects
Robust, real-time tracking of objects from visual data requires probabilistic fusion of multiple visual cues. Previous approaches have either been ad hoc or relied on a Bayesian n...
Jamie Sherrah, Shaogang Gong