Sciweavers

307 search results - page 27 / 62
» A Network Access Control Mechanism Based on Behavior Profile...
Sort
View
WOWMOM
2000
ACM
96views Multimedia» more  WOWMOM 2000»
14 years 20 hour ago
An integrated mobility and traffic model for resource allocation in wireless networks
In a wireless communications network, the movement of mobile users presents significant technical challenges to providing efficient access to the wired broadband network. In this ...
Hisashi Kobayashi, Shun-Zheng Yu, Brian L. Mark
FAST
2010
13 years 10 months ago
Discovery of Application Workloads from Network File Traces
An understanding of application I/O access patterns is useful in several situations. First, gaining insight into what applications are doing with their data at a semantic level he...
Neeraja J. Yadwadkar, Chiranjib Bhattacharyya, K. ...
TWC
2008
188views more  TWC 2008»
13 years 7 months ago
Joint power control and beamforming for cognitive radio networks
We consider a secondary usage of spectrum scenario where a secondary network coexists and/or shares the radio spectrum with a primary network to which the spectrum is licensed. The...
Habibul Islam, Ying-Chang Liang, Anh Tuan Hoang
MSWIM
2005
ACM
14 years 1 months ago
Adaptive transmission opportunity with admission control for IEEE 802.11e networks
The increase of IEEE 802.11’s bandwidth led to a deployment of many multimedia applications over wireless networks. Nevertheless, these applications impose stringent constraints...
Adlen Ksentini, Abdelhak Guéroui, Mohamed N...
ICC
2008
IEEE
176views Communications» more  ICC 2008»
14 years 2 months ago
A k-Nearest Neighbor Approach for User Authentication through Biometric Keystroke Dynamics
— Keystroke dynamics exhibit people’s behavioral features which are similar to hand signatures. A major problem hindering the large scale deployment of this technology is its h...
Jiankun Hu, Don Gingrich, Andy Sentosa