Sciweavers

1259 search results - page 134 / 252
» An Efficient Mobile Authentication Scheme for Wireless Netwo...
Sort
View
EUROPKI
2004
Springer
14 years 1 months ago
Trustworthy Accounting for Wireless LAN Sharing Communities
Abstract. The Peer-to-Peer Wireless Network Confederation (P2PWNC) is designed to be an open self-organizing Wireless LAN (WLAN) roaming association where users from one WLAN can a...
Elias C. Efstathiou, George C. Polyzos
NETWORKING
2004
13 years 9 months ago
Call Admission Control for Voice/Data Integration in Broadband Wireless Networks
This paper addresses bandwidth allocation for an integrated voice/data broadband mobile wireless network. Specifically, we propose a new admission control scheme called EFGC, whic...
Majid Ghaderi, Raouf Boutaba
SIGMOD
1994
ACM
175views Database» more  SIGMOD 1994»
14 years 5 days ago
Sleepers and Workaholics: Caching Strategies in Mobile Environments
In the mobile wireless computing environment of the future, a large number of users, equipped with low-powered palmtop machines, will query databases over wireless communication ch...
Daniel Barbará, Tomasz Imielinski
ISSA
2008
13 years 9 months ago
A Proof-of-Concept Implementation of EAP-TLS with TPM Support
Many people who have tried to configure their IEEE 802.11 enabled mobile phones to connect to a public wireless hotspot know one of the major differences between IEEE 802.11 netwo...
Carolin Latze, Ulrich Ultes-Nitsche
WCNC
2008
IEEE
14 years 2 months ago
Neighbor-Aware Adaptive Retry Limit for IEEE 802.11-Based Mobile Ad Hoc Networks
— In a mobile ad hoc network (MANET), it has been addressed that packet losses due to collision are often misinterpreted as routing failures, and cause unnecessary overhead for r...
Sehoon Kim, Jinkyu Lee, Ikjun Yeom