Sciweavers

99 search results - page 12 / 20
» The case for a network protocol isolation layer
Sort
View
B
2007
Springer
13 years 11 months ago
Security Policy Enforcement Through Refinement Process
Abstract. In the area of networks, a common method to enforce a security policy expressed in a high-level language is based on an ad-hoc and manual rewriting process [24]. We argue...
Nicolas Stouls, Marie-Laure Potet
WD
2010
13 years 5 months ago
Beamforming for heterogeneously equipped nodes in wireless ad hoc networks
It has long been known that adaptive beamforming has the potential to enhance the performance of wireless ad hoc networks significantly. However, due to the decentralized nature of...
Ulrike Korger, Manuel Wocheslander, Christian Hart...
TNC
2004
105views Education» more  TNC 2004»
13 years 9 months ago
Why Seamless? Towards Exploiting WLAN-Based Intermittent Connectivity on the Road
This paper discusses new mobile usage scenarios for WLAN technologies and presents an architecture that is based on the notion of intermittent connectivity instead of seamless con...
Jörg Ott, Dirk Kutscher
IFIP
2003
Springer
14 years 25 days ago
Enhanced Power Saving Scheme for IEEE 802.11 DCF Based Wireless Networks
Abstract. Providing energy efficiency in MAC (Medium Access Control) layer, while achieving desirable throughput, is an important research issue in the area of wireless networking....
Jong-Mu Choi, Young-Bae Ko, Jai-Hoon Kim
NOSSDAV
1993
Springer
13 years 11 months ago
A Multimedia Enhanced Transport Service in a Quality of Service Architecture
For applications relying on the transfer of multimedia, and in particular continuous media, it is essential that quality of service (QoS) is guaranteed system-wide, including end-s...
Andrew T. Campbell, Geoff Coulson, David Hutchison