Sciweavers

1938 search results - page 333 / 388
» Structure of Service Areas in Wireless Communication Network...
Sort
View
DIM
2005
ACM
13 years 10 months ago
Pseudonym management using mediated identity-based cryptography
Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third ...
Thibault Candebat, Cameron Ross Dunne, David T. Gr...
ICC
2007
IEEE
160views Communications» more  ICC 2007»
14 years 3 months ago
IEEE 802.11-Based Mobile IP Fast Handoff Latency Analysis
— Mobile IP is a solution for mobility support in the global Internet. However, it suffers from long handoff delay. Many solutions have been proposed to reduce the handoff delay ...
Jiang Xie, Ivan Howitt, Izzeldin Shibeika
SAC
2003
ACM
14 years 2 months ago
TinyGALS: A Programming Model for Event-Driven Embedded Systems
Networked embedded systems such as wireless sensor networks are usually designed to be event-driven so that they are reactive and power efficient. Programming embedded systems wit...
Elaine Cheong, Judith Liebman, Jie Liu, Feng Zhao
SIGCOMM
2009
ACM
14 years 3 months ago
PLUG: flexible lookup modules for rapid deployment of new protocols in high-speed routers
New protocols for the data link and network layer are being proposed to address limitations of current protocols in terms of scalability, security, and manageability. High-speed r...
Lorenzo De Carli, Yi Pan, Amit Kumar, Cristian Est...
IWQOS
2004
Springer
14 years 2 months ago
Small world overlay P2P networks
In this paper, we consider how to “construct” and “maintain” an overlay structured P2P network based on the “smallworld paradigm”. Two main attractive properties of a ...
Ken Y. K. Hui, John C. S. Lui, David K. Y. Yau