Sciweavers

206 search results - page 38 / 42
» Use of Chinese Short Messages
Sort
View
ICCSA
2010
Springer
14 years 2 months ago
Authentication - Based Medium Access Control to Prevent Protocol Jamming: A-MAC
Abstract. Recently, Wireless Local Area Network (WLAN) is used by enterprises, government, and the military, as well as small office and home offices. Although it is convenient, it...
Jaemin Jeung, Seungmyeong Jeong, Jaesung Lim
INFOCOM
1999
IEEE
13 years 11 months ago
Cell Identification Codes for Tracking Mobile Users
The minimization of the wireless cost of tracking mobile users is a crucial issue in wireless networks. Some of the previous strategies addressing this issue leave an open gap, by ...
Zohar Naor, Hanoch Levy
DNA
2009
Springer
158views Bioinformatics» more  DNA 2009»
14 years 1 months ago
Design of a Biomolecular Device That Executes Process Algebra
Process algebras are widely used for defining the formal semantics of concurrent communicating processes. In process algebra, concurrent processes can be specified to execute di...
Urmi Majumder, John H. Reif
CSREASAM
2003
13 years 8 months ago
Randomized Traitor Tracing Algorithms for Broadcast Security
We introduce and analyze a randomized traitor tracing algorithm for broadcast security. This algorithm is very efficient compared to brute force methods (the mean time it takes is...
Simon McNicol, Serdar Boztas
JCO
2006
106views more  JCO 2006»
13 years 7 months ago
Reliable Ad Hoc Routing Based on Mobility Prediction
Reliability is a very important issue in Mobile Ad hoc NETworks (MANETs). Shortest paths are usually used to route packets in MANETs. However, a shortest path may fail quickly, bec...
Jian Tang, Guoliang Xue, Weiyi Zhang