Sciweavers

1805 search results - page 45 / 361
» Understanding Code Mobility
Sort
View
ESORICS
2002
Springer
14 years 9 months ago
TINMAN: A Resource Bound Security Checking System for Mobile Code
Resource security pertains to the prevention of unauthorized usage of system resources that may not directly cause corruption or leakage of information. A common breach of resource...
Aloysius K. Mok, Weijiang Yu
BROADNETS
2004
IEEE
14 years 1 months ago
DCC-MAC: A Decentralized MAC Protocol for 802.15.4a-like UWB Mobile Ad-Hoc Networks Based on Dynamic Channel Coding
We present a joint PHY/MAC architecture (DCC-MAC) for 802.15.4a-like networks based on PPM-UWB. Unlike traditional approaches it fully utilizes the specific nature of UWB to achie...
Jean-Yves Le Boudec, Ruben Merz, Bozidar Radunovic...
INFOCOM
2007
IEEE
14 years 4 months ago
Network Coding-Based Broadcast in Mobile Ad-hoc Networks
Abstract— Broadcast operation, which disseminates information network-wide, is very important in multi-hop wireless networks. Due to the broadcast nature of wireless media, not a...
Erran L. Li, Ramachandran Ramjee, Milind M. Buddhi...
CSFW
2000
IEEE
14 years 1 months ago
Confidentiality for Mobile Code: The Case of a Simple Payment Protocol
We propose an approach to support confidentiality for mobile implementations of security-sensitive protocols using Java/JVM. An applet which receives and passes on confidential in...
Mads Dam, Pablo Giambiagi
JSAC
2007
102views more  JSAC 2007»
13 years 9 months ago
A Robust Coded MIMO FH-CDMA Transceiver for Mobile Ad Hoc Networks
Abstract— In this paper, we develop a coded MIMO FHCDMA transceiver that is robust to partial-band jamming and the near-far problem for ad hoc networks with high mobility. Spatia...
Haichang Sui, James R. Zeidler