Sciweavers

161 search results - page 25 / 33
» Accessing Location and Proximity Information in a Decentrali...
Sort
View
JSAC
2011
107views more  JSAC 2011»
13 years 2 months ago
Joint Network Capacity Region for Cognitive Networks Heterogeneous Environments and RF-Environment Awareness
In this paper, we characterize the joint network capacity region for a licensed broadcast (primary) and ad hoc cognitive (secondary) network in a heterogeneous environment, includ...
Yuchul Kim, Gustavo de Veciana
CCS
2009
ACM
14 years 2 months ago
Physically restricted authentication with trusted hardware
Modern computer systems permit users to access protected information from remote locations. In certain secure environments, it would be desirable to restrict this access to a part...
Michael S. Kirkpatrick, Elisa Bertino
TGC
2005
Springer
14 years 26 days ago
Types for Security in a Mobile World
Our society is increasingly moving towards richer forms of information exchange where mobility of processes and devices plays a prominent role. This tendency has prompted the acade...
Adriana B. Compagnoni, Elsa L. Gunter
ICT
2004
Springer
127views Communications» more  ICT 2004»
14 years 22 days ago
An Interference Avoidance Technique for Ad Hoc Networks Employing Array Antennas
Array antennas have the potential to increase the capacity of wireless networks, but a distributed beamforming algorithm for maximizing the capacity in asynchronous, decentralized ...
T. Hunziker, Jacir Luiz Bordim, T. Ohira, Shinsuke...
ICRA
2002
IEEE
166views Robotics» more  ICRA 2002»
14 years 9 days ago
Real Time Visualization of Robot State with Mobile Virtual Reality
— With the deployment of large, distributed networks of cameras and other sensors, it is becoming necessary to also address the issue of how to effectively present the large vol...
Peter Amstutz, Andrew H. Fagg