Sökning: "Access protocols"
Visar resultat 16 - 20 av 157 avhandlingar innehållade orden Access protocols.
16. Multihop Wireless Networks with Advanced Antenna Systems : An Alternative for Rural Communication
Sammanfattning : Providing access to telecommunication services in rural areas is of paramount importance for the development of any country. Since the cost is the main inhibiting factor, any technical solution for access in sparsely populated rural areas has to be reliable, efficient, and deployable at low-cost. LÄS MER
17. Toward Adjustable Lightweight Authentication for Network Access Control
Sammanfattning : The increasing use of Internet access networks raises the demand for secure and reliable communication for both users and businesses. Traditionally, the aim has been to provide the strongest possible security. LÄS MER
18. Modeling, Analysis and Design of Wireless Sensor Network Protocols
Sammanfattning : Wireless sensor networks (WSNs) have a tremendous potential to improve the efficiencyof many systems, for instance, in building automation and process control.Unfortunately, the current technology does not offer guaranteed energy efficiencyand reliability for closed-loop stability. LÄS MER
19. Privacy Analysis and Protocols for Decentralized Online Social Networks
Sammanfattning : Decentralized Online Social Networks (DOSNs) are evolving as a promising approach to mitigate design-inherent privacy flaws of logically centralized services such as Facebook, Google+ or Twitter. Common approaches to implement a DOSN build upon a peer-to-peer (P2P) architecture in order to avoid the central aggregation of sensitive user data at one provider-controlled location. LÄS MER
20. An Efficient Access Control Method for Resource Constrained Embedded Systems
Sammanfattning : The way to communicate and distribute the information in Wireless Sensor Networks (WSN) is constantly under evolution; at beginning the networks sent the information using proprietary protocols; but today, using IP protocol has become widely used to improve the interoperability and to standardize. These nodes often are constrained re- source devices and are not able to use the same mechanisms that a normal computer uses, because the processing performance and memory capacity are smaller than a nor- mal computer. LÄS MER