|
Conferences in DBLP
Performance evaluation of real-time schedulers for HCCA function in IEEE 802.11e wireless networks. [Citation Graph (, )][DBLP]
Throughput and QoS optimization in nonuniform multichannel wireless mesh networks. [Citation Graph (, )][DBLP]
A dynamic call admission control scheme for optimization with QoS provisioning in multiclass cellular networks. [Citation Graph (, )][DBLP]
Fast, secure handovers in 802.11: back to the basis. [Citation Graph (, )][DBLP]
MobiSEC: a novel security architecture for wireless mesh networks. [Citation Graph (, )][DBLP]
Adaptive traffic filtering for efficient and secure IP-mobility. [Citation Graph (, )][DBLP]
The cost of protecting privacy in multimedia applications. [Citation Graph (, )][DBLP]
In-network optimal rate reduction for packetized MPEG video. [Citation Graph (, )][DBLP]
A distributed resource management scheme for load-balanced QoS provisioning in heterogeneous mobile wireless networks. [Citation Graph (, )][DBLP]
ProbeCast: MANET admission control via probing. [Citation Graph (, )][DBLP]
A priority based QoS-Aware MAC protocol (PQAMP) in mobile ad hoc networks. [Citation Graph (, )][DBLP]
TSR: trust-based secure MANET routing using HMMs. [Citation Graph (, )][DBLP]
Trust transferability among similar contexts. [Citation Graph (, )][DBLP]
Using context information to evaluate cooperativeness. [Citation Graph (, )][DBLP]
Secure authentication and management scheme for RFID. [Citation Graph (, )][DBLP]
Differentiated security in wireless mesh networks. [Citation Graph (, )][DBLP]
An efficient security algorithm in mobile computing for resource constrained mobile devices. [Citation Graph (, )][DBLP]
|