Sciweavers

1259 search results - page 197 / 252
» An Efficient Mobile Authentication Scheme for Wireless Netwo...
Sort
View
IJNSEC
2006
156views more  IJNSEC 2006»
13 years 8 months ago
Security in Pervasive Computing: Current Status and Open Issues
Million of wireless device users are ever on the move, becoming more dependent on their PDAs, smart phones, and other handheld devices. With the advancement of pervasive computing...
Munirul M. Haque, Sheikh Iqbal Ahamed
PADS
2003
ACM
14 years 1 months ago
Power-aware State Dissemination in Mobile Distributed Virtual Environments
In distributed simulations, such as multi-player distributed virtual environments (DVE), power consumption traditionally has not been a major design factor. However, emerging batt...
Weidong Shi, Kalyan S. Perumalla, Richard M. Fujim...

Publication
209views
13 years 5 months ago
Adaptive beamforming method based on constrained LMS algorithm for tracking mobile user
In this paper, Constrained Least Mean Square (CLMS) algorithm for narrowband adaptive beamforming for tracking mobile user in a 2D urban environment has been used. This algorithm i...
Peyman Rahmati
BROADNETS
2007
IEEE
14 years 2 months ago
Modeling and performance analysis of an improved DCF-based mechanism under noisy channel
The ISM free-licence band is highly used by wireless technologies such IEEE 802.11, Bluetooth as well as private wireless schemes. This huge utilisation increases dramatically the ...
Adlen Ksentini, Marc Ibrahim
PERCOM
2005
ACM
14 years 7 months ago
Secure Routing and Intrusion Detection in Ad Hoc Networks
Numerous schemes have been proposed for secure routing protocols, and Intrusion Detection and Response Systems, for ad hoc networks. In this paper, we present a proof-of-concept i...
Anand Patwardhan, Jim Parker, Anupam Joshi, Michae...