Sciweavers

1462 search results - page 54 / 293
» The Abstract MAC Layer
Sort
View
FSE
2007
Springer
115views Cryptology» more  FSE 2007»
14 years 4 months ago
Improving the Security of MACs Via Randomized Message Preprocessing
Abstract. “Hash then encrypt” is an approach to message authentication, where first the message is hashed down using an ε-universal hash function, and then the resulting k-bi...
Yevgeniy Dodis, Krzysztof Pietrzak
HIPC
2007
Springer
14 years 4 months ago
Channel Adaptive Real-Time MAC Protocols for a Two-Level Heterogeneous Wireless Network
Abstract. Wireless technology is becoming an attractive mode of communication for real-time applications in typical settings such as in an industrial setup because of the tremendou...
Kavitha Balasubramanian, G. Sudha Anil Kumar, G. M...
WSC
2000
13 years 11 months ago
Abstract modeling for engineering and engagement level simulations
MODELING FOR ENGINEERING AND ENGAGEMENT LEVEL SIMULATIONS Robert M. McGraw Richard A. MacDonald RAM Laboratories, Inc. 6540 Lusk Boulevard, Suite C200 San Diego, CA 92121, U.S.A. ...
Robert M. McGraw, Richard A. MacDonald
INFOCOM
2008
IEEE
14 years 4 months ago
Real-Time Video Multicast in WiMAX Networks
Abstract—IEEE 802.16e WiMAX is a promising new technology for broadband access networks. Amongst the class of applications that can be supported is real time video services (such...
Supratim Deb, Sharad Jaiswal, Kanthi Nagaraj
BROADNETS
2007
IEEE
14 years 4 months ago
Cross-layer optimization made practical
Abstract— Limited resources and time-varying nature of wireless ad hoc networks demand optimized use of resources across layers. Cross-layer optimization (CLO) for wireless netwo...
Ajit Warrier, Long Le, Injong Rhee