Sciweavers

170 search results - page 22 / 34
» System Design Considerations for Undersea Networks: Link and...
Sort
View
CCS
2009
ACM
14 years 1 months ago
Physically restricted authentication with trusted hardware
Modern computer systems permit users to access protected information from remote locations. In certain secure environments, it would be desirable to restrict this access to a part...
Michael S. Kirkpatrick, Elisa Bertino
JNCA
2007
128views more  JNCA 2007»
13 years 6 months ago
Embedded web server-based home appliance networks
Powerful microcontrollers are used as parts of most home and office appliances of today. Integrating web servers to these intelligent devices will aid in controlling them over th...
M. Can Filibeli, Öznur Özkasap, M. Reha ...
EURONGI
2006
Springer
13 years 10 months ago
The Challenges of Merging Two Similar Structured Overlays: A Tale of Two Networks
Structured overlay networks is an important and interesting primitive that can be used by diverse peer-to-peer applications. Multiple overlays can result either because of network ...
Anwitaman Datta, Karl Aberer
TELETRAFFIC
2007
Springer
14 years 25 days ago
Is ALOHA Causing Power Law Delays?
Abstract. Renewed interest in ALOHA-based Medium Access Control (MAC) protocols stems from their proposed applications to wireless ad hoc and sensor networks that require distribut...
Predrag R. Jelenkovic, Jian Tan
WOWMOM
2005
ACM
184views Multimedia» more  WOWMOM 2005»
14 years 8 days ago
ALCA: A New Scheme for Power Control on 802.11 Ad Hoc Networks
— This paper presents the ALCA (Asymmetric Link Collision Avoidance) protocol. ALCA was designed to deal with a known deficiency of the Basic Scheme [1] for power control in 802...
Alexandre Andrade Pires, José Ferreira de R...