Sciweavers

289 search results - page 25 / 58
» The application of fluid mobility modelling in wireless cell...
Sort
View
CCS
2001
ACM
14 years 7 days ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
LCN
2003
IEEE
14 years 1 months ago
Best-Effort Low-Delay Service
The Differentiated Services (DiffServ) approach is intended to provide Quality of Service (QoS) in IP-based networks. This is a very important issue not only in wire-line fixed n...
Jörg Diederich, Mark Doll, Martina Zitterbart

Publication
232views
13 years 6 months ago
Measurement in 802.11 Wireless Networks and its Applications
Ease of deployment, wireless connectivity and ubiquitous mobile on-the-go computing has made the IEEE 802.11 the most widely deployed Wireless Local Area Network (WLAN) sta...
Malik Ahmad Yar Khan
NETGAMES
2003
ACM
14 years 1 months ago
Mobility and stability evaluation in wireless multi-hop networks using multi-player games
Plenty of work was contributed in the field of protocol design and performance evaluation of multi-hop networks. It is generally accepted that mobility has a huge impact on the p...
Frank H. P. Fitzek, Leonardo Badia, Michele Zorzi,...
ICDCS
2008
IEEE
14 years 2 months ago
Mobility-Assisted Spatiotemporal Detection in Wireless Sensor Networks
Wireless sensor networks (WSNs) deployed for missioncritical applications face the fundamental challenge of meeting stringent spatiotemporal performance requirements using nodes w...
Guoliang Xing, Jianping Wang, Ke Shen, Qingfeng Hu...