Sciweavers

COMCOM
2008
99views more  COMCOM 2008»
13 years 11 months ago
SPICE: Scalable P2P implicit group messaging
Implicit group messaging (IGM) is a decoupled messaging paradigm for connecting content publishers and consumers over the Internet. Unlike traditional multicast or publish/subscri...
Daniel Cutting, Aaron J. Quigley, Björn Landf...
COMCOM
2010
116views more  COMCOM 2010»
13 years 11 months ago
Optimal frame size analysis for framed slotted ALOHA based RFID networks
We offer an analytical solution for the optimal frame size of the non-muting version of the Basic Frame Slotted ALOHA collision resolution protocol for RFID networks. Previous inv...
Zornitza Genova Prodanoff
COMCOM
2010
81views more  COMCOM 2010»
13 years 11 months ago
A forcing collision resolution approach able to prioritize traffic in CSMA-based networks
Ricardo Moraes, Francisco Vasques, Paulo Portugal,...
COMCOM
2007
156views more  COMCOM 2007»
13 years 11 months ago
A survey on clustering algorithms for wireless sensor networks
The past few years have witnessed increased interest in the potential use of wireless sensor networks (WSNs) in applications such as disaster management, combat field reconnaissa...
Ameer Ahmed Abbasi, Mohamed F. Younis
COMCOM
2007
145views more  COMCOM 2007»
13 years 11 months ago
Jointly rate and power control in contention based MultiHop Wireless Networks
This paper presents a new algorithm for jointly optimal control of session rate, link attempt rate, and link power in contention based MultiHop Wireless Networks. Formulating the ...
Abdorasoul Ghasemi, Karim Faez
COMCOM
2007
123views more  COMCOM 2007»
13 years 11 months ago
Heuristic and optimal techniques for light-trail assignment in optical ring WDM networks
In this paper we address the problem of constrained optimization (ILP formulation) and propose a set of heuristic algorithms for assigning light-trails [1–4,7,10] to WDM ring ne...
Ashwin Gumaste, Paparao Palacharla
COMCOM
2007
106views more  COMCOM 2007»
13 years 11 months ago
An ontology description for SIP security flaws
— Voice over IP (VoIP) services based on the Session Initiation Protocol (SIP) gain ground as compared to other protocols like MGCP or H.323. However, the open SIP architecture c...
Dimitris Geneiatakis, Costas Lambrinoudakis
COMCOM
2008
82views more  COMCOM 2008»
13 years 11 months ago
Virtual password using random linear functions for on-line services, ATM machines, and pervasive computing
People enjoy the convenience of on-line services, Automated Teller Machines (ATMs), and pervasive computing, but online environments, ATMs, and pervasive computing may bring many r...
Ming Lei, Yang Xiao, Susan V. Vrbsky, Chung-Chih L...
COMCOM
2008
62views more  COMCOM 2008»
13 years 11 months ago
Secure multi-mode systems and their applications for pervasive computing
Submissions should include an abstract, 5-10 key words, and the e
Jong Hyuk Park, Hsiao-Hwa Chen, Antonio Coronato, ...