Sciweavers

SIGCOMM
1997
ACM
14 years 3 months ago
Solutions to Hidden Terminal Problems in Wireless Networks
The floor acquisition multiple access (FAMA) discipline is analyzed in networks with hidden terminals. According to FAMA, control of the channel (the floor) is assigned to at mo...
Chane L. Fullmer, J. J. Garcia-Luna-Aceves
SIGCOMM
1997
ACM
14 years 3 months ago
Small Forwarding Tables for Fast Routing Lookups
For some time, the networking communityhas assumed that it is impossible to do IP routing lookups in software fast enough to support gigabit speeds. IP routing lookups must nd th...
Mikael Degermark, Andrej Brodnik, Svante Carlsson,...
SIGCOMM
1997
ACM
14 years 3 months ago
Consistent Overhead Byte Stuffing
—Byte stuffing is a process that encodes a sequence of data bytes that may contain ‘illegal’ or ‘reserved’ values, using a potentially longer sequence that contains no oc...
Stuart Cheshire, Mary Baker
SIGCOMM
1997
ACM
14 years 3 months ago
Active Bridging
D. Scott Alexander, Marianne Shaw, Scott Nettles, ...
MOBICOM
1997
ACM
14 years 3 months ago
A Public-Key Based Secure Mobile IP
John Zao, Stephen T. Kent, Joshua Gahm, Gregory Tr...
MOBICOM
1997
ACM
14 years 3 months ago
Reliable Broadcast in Mobile Multihop Packet Networks
We describe a reliable broadcast protocol for mobile multihop packet radio networks. The reliable broadcast service ensures that all the hosts in a group deliver the same set of m...
Elena Pagani, Gian Paolo Rossi
MOBICOM
1997
ACM
14 years 3 months ago
Composable ad-hoc Mobile Services for Universal Interaction
This paperintroduces the notion of “universalinteraction,” allowing a device to adapt its functionality to exploit services it discovers as it moves into a new environment. Us...
Todd D. Hodes, Randy H. Katz, Edouard Servan-Schre...
MOBICOM
1997
ACM
14 years 3 months ago
Log-Time Algorithms for Scheduling Single and Multiple Channel Data Broadcast
With the increasing popularity of portable wireless computers, mechanisms to efficiently transmit information to such clients are of significant interest. The environmentundercons...
Sohail Hameed, Nitin H. Vaidya
MOBICOM
1997
ACM
14 years 3 months ago
A Protection Scheme for Mobile Agents on Java
: This paper describes a protection scheme for mobile agents implemented on a Java environment. In this scheme, access to objects is controlled by means of software capabilities th...
Daniel Hagimont, Leila Ismail