Sciweavers

425 search results - page 47 / 85
» adhoc 2007
Sort
View
ADHOC
2007
118views more  ADHOC 2007»
13 years 10 months ago
Sticky CSMA/CA: Implicit synchronization and real-time QoS in mesh networks
We propose a novel approach to QoS for real-time traffic over wireless mesh networks, in which application layer characteristics are exploited or shaped in the design of medium ac...
Sumit Singh, Prashanth Aravinda Kumar Acharya, Upa...
ADHOC
2007
173views more  ADHOC 2007»
13 years 10 months ago
An adaptive transmission-scheduling protocol for mobile ad hoc networks
Transmission-scheduling protocols can support contention-free link-level broadcast transmissions and delay sensitive traffic in mobile, multiple-hop packet radio networks. Use of t...
Praveen K. Appani, Joseph L. Hammond, Daniel L. No...
ICISC
2004
146views Cryptology» more  ICISC 2004»
13 years 11 months ago
Identity Based Threshold Ring Signature
In threshold ring signature schemes, any group of t entities spontaneously conscript arbitrarily n - t entities to generate a publicly verifiable t-out-of-n signature on behalf of ...
Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming ...
ISCI
2007
134views more  ISCI 2007»
13 years 10 months ago
A location-aware multicasting protocol for Bluetooth Location Networks
Bluetooth Location Network (BLN) is a Bluetooth radio network that is composed of some mobile Bluetooth devices and static Bluetooth units, and is established at the system initia...
Chih-Yung Chang, Kuei-Ping Shih, Chung-Hsien Hsu, ...
JMM
2007
107views more  JMM 2007»
13 years 10 months ago
Using a Spatial Context Authentication Proxy for Establishing Secure Wireless Connections
Spontaneous interaction in wireless ad-hoc networks is often desirable not only between users or devices in direct contact, but also with devices that are accessible only via a wi...
Rene Mayrhofer, Roswitha Gostner