Sciweavers

1588 search results - page 272 / 318
» Wireless personal area networks
Sort
View
CASES
2006
ACM
14 years 3 months ago
A case study of multi-threading in the embedded space
The continuing miniaturization of technology coupled with wireless networks has made it feasible to physically embed sensor network systems into the environment. Sensor net proces...
Greg Hoover, Forrest Brewer, Timothy Sherwood
AUTONOMICS
2008
ACM
13 years 11 months ago
On modeling of self-organizing systems
A goal of computing and networking systems is to limit administrative requirements for users and operators. A technical systems should be able to configure itself as much as possi...
Richard Holzer, Hermann de Meer
IJNSEC
2006
143views more  IJNSEC 2006»
13 years 9 months ago
Password Authentication Schemes: Current Status and Key Issues
Password authentication is one of the simplest and the most convenient authentication mechanisms to deal with secret data over insecure networks. It is more frequently required in...
Chwei-Shyong Tsai, Cheng-Chi Lee, Min-Shiang Hwang
ENTCS
2008
390views more  ENTCS 2008»
13 years 8 months ago
Cryptographic Versus Trust-based Methods for MANET Routing Security
Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a fixed infrastructure. Early routing protocols for MANETs failed to take security issues ...
Jared Cordasco, Susanne Wetzel
CCGRID
2005
IEEE
14 years 3 months ago
A high performance configurable transport protocol for grid computing
− Grid computing infrastructures and applications are increasingly diverse, with networks ranging from very high bandwidth optical networks to wireless networks and applications ...
Xinran (Ryan) Wu, Andrew A. Chien, Matti A. Hiltun...