Sciweavers

889 search results - page 130 / 178
» Towards service and user discovery on wireless networks
Sort
View
ICSNC
2007
IEEE
14 years 2 months ago
Using the mobile phone as a security token for unified authentication
- The number of different identities and credentials used for authentication towards services on the Internet has increased beyond the manageable. Still, the most common authentica...
Steffen Hallsteinsen, Ivar Jørstad, Do Van ...
GLOBECOM
2007
IEEE
13 years 11 months ago
Joint Traffic Blocking and Routing Under Network Failures and Maintenances
Under device failures and maintenance activities, network resources reduce and congestion may arise inside networks. As a result, users experience degraded performance on packet d...
Chao Liang, Zihui Ge, Yong Liu
TWC
2008
176views more  TWC 2008»
13 years 7 months ago
Asynchronous distributed power and rate control in ad hoc networks: a game-theoretic approach
This paper analyzes distributed asynchronous power and rate control for wireless ad hoc networks. Importantly, all network transmitters are considered to be independent of any mana...
Stepán Kucera, Sonia Aïssa, Koji Yamam...
INFOCOM
2003
IEEE
14 years 29 days ago
Flow Aggregation for Enhanced TCP over Wide Area Wireless
Abstract— Throughout the world, GSM cellular mobile networks are being upgraded to support the “always-on” General Packet Radio Service (GPRS). Despite the apparent availabil...
Rajiv Chakravorty, Sachin Katti, Ian Pratt, Jon Cr...
AAAI
2012
11 years 10 months ago
A Spin-Glass Model for Semi-Supervised Community Detection
Current modularity-based community detection methods show decreased performance as relational networks become increasingly noisy. These methods also yield a large number of divers...
Eric Eaton, Rachael Mansbach