Sciweavers

68 search results - page 5 / 14
» A 3GPP-IMS Based Approach for Converging Next Generation Mob...
Sort
View
ESAS
2007
Springer
14 years 14 days ago
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...
Rene Mayrhofer
ECUMN
2007
Springer
14 years 2 months ago
Utility-Based Bandwidth Allocation for Triple-Play Services
It is expected that, in near future, the multi-class traffic previously in Public Switched Telephone network (PSTN), cable television network and IP network will be multiplexed at...
Changbin Liu, Lei Shi, Bin Liu
PIMRC
2008
IEEE
14 years 3 months ago
A Distributed IP Mobility Approach for 3G SAE
—Future generations of mobile operator networks, based on an all-IP-based flat architecture and a multitude of different access technologies, require a proper IP-based mobility ...
Mathias Fischer, Frank-Uwe Andersen, Andreas K&oum...
ICDS
2009
IEEE
14 years 3 months ago
A Hybrid Approach for Clustering-Based Data Aggregation in Wireless Sensor Networks
—In a wireless sensor network application for tracking multiple mobile targets, large amounts of sensing data can be generated by a number of sensors. These data must be controll...
Woo Sung Jung, Keun Woo Lim, Young-Bae Ko, Sang-Jo...
VTC
2006
IEEE
199views Communications» more  VTC 2006»
14 years 2 months ago
Comparison of User Mobility Pattern Prediction Algorithms to increase Handover Trigger Accuracy
— The estimation of correct triggers for handover in cellular networks belongs to the critical tasks for accurate network operation. The importance of seamless handover even rise...
Stefan Michaelis, Christian Wietfeld