Sciweavers

299 search results - page 51 / 60
» Transaction Policies for Mobile Networks
Sort
View
TMC
2008
146views more  TMC 2008»
13 years 8 months ago
Cross-Layer Interaction of TCP and Ad Hoc Routing Protocols in Multihop IEEE 802.11 Networks
In this research, we first investigate the cross-layer interaction between TCP and routing protocols in the IEEE 802.11 ad hoc network. On-demand ad hoc routing protocols respond t...
Kitae Nahm, Ahmed Helmy, C. C. Jay Kuo
ACNS
2011
Springer
241views Cryptology» more  ACNS 2011»
13 years 6 days ago
Misuse Detection in Consent-Based Networks
Consent-based networking, which requires senders to have permission to send traffic, can protect against multiple attacks on the network. Highly dynamic networks like Mobile Ad-hoc...
Mansoor Alicherry, Angelos D. Keromytis
HICSS
2006
IEEE
134views Biometrics» more  HICSS 2006»
14 years 2 months ago
Differentiated Priority Scheduling and Adaptive Segmentation for Bluetooth Piconets
Bluetooth is a wireless communication technology, aimed at supporting connectivity among close proximity mobile devices. Bluetooth enables the design of low-power, low-cost, and s...
Jyothsna Kalvala, Gergely V. Záruba
CCR
2002
97views more  CCR 2002»
13 years 8 months ago
Multi-modal network protocols
Most network protocols are uni-modal: they employ a single set of algorithms that allows them to cope well only within a narrow range of operating conditions. This rigid design re...
Rajesh Krishna Balan, Aditya Akella, Srinivasan Se...
DIM
2005
ACM
13 years 10 months ago
Pseudonym management using mediated identity-based cryptography
Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third ...
Thibault Candebat, Cameron Ross Dunne, David T. Gr...