Sciweavers

828 search results - page 148 / 166
» Access Control in Location-Based Services
Sort
View
INFOCOM
2007
IEEE
14 years 2 months ago
Bandwidth Balancing in Multi-Channel IEEE 802.16 Wireless Mesh Networks
Abstract— In wireless mesh networks, the end-to-end throughput of traffic flows depends on the path length, i.e. the higher the number of hops, the lower becomes the throughput...
Claudio Cicconetti, Ian F. Akyildiz, Luciano Lenzi...
VTC
2007
IEEE
121views Communications» more  VTC 2007»
14 years 2 months ago
Downlink Traffic Power Characterization for Multi-Rate Wireless CDMA Data Networks
— The characterization of downlink traffic power is an important issue for the design of efficient call admission control (CAC) and radio resource management (RRM) procedures. In...
Ashraf S. Hasan Mahmoud
CCS
2007
ACM
14 years 2 months ago
A flexible security architecture to support third-party applications on mobile devices
The problem of supporting the secure execution of potentially malicious third-party applications has received a considerable amount of attention in the past decade. In this paper ...
Lieven Desmet, Wouter Joosen, Fabio Massacci, Kats...
OTM
2007
Springer
14 years 2 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
INFOCOM
2006
IEEE
14 years 2 months ago
Effective Packet Scheduling with Fairness Adaptation in Ultra Wideband Wireless Networks
Abstract— The inherent spread spectrum nature in ultrawideband (UWB) communications can support simultaneous transmissions. Two nearby transmissions do not collide, but rather ge...
Hai Jiang, Weihua Zhuang