Sciweavers

1259 search results - page 221 / 252
» An Efficient Mobile Authentication Scheme for Wireless Netwo...
Sort
View
CCR
2004
168views more  CCR 2004»
13 years 8 months ago
Coping with irregular spatio-temporal sampling in sensor networks
Wireless sensor networks have attracted attention from a diverse set of researchers, due to the unique combination of distributed, resource and data processing constraints. Howeve...
Deepak Ganesan, Sylvia Ratnasamy, Hanbiao Wang, De...
SCN
2008
Springer
157views Communications» more  SCN 2008»
13 years 8 months ago
Insider attack attribution using signal strength-based hyperbolic location estimation
A rogue insider, in a wireless network, is an authenticated member that exploits possession of a valid identity in order to launch an attack. A typical example is the transmission...
Christine Laurendeau, Michel Barbeau
WOWMOM
2009
ACM
164views Multimedia» more  WOWMOM 2009»
14 years 2 months ago
Selecting vertical handover candidates in IEEE 802.11 mesh networks
The IEEE 802.11 working group currently integrates the option of mesh networking into its standard for WLANs. In addition to WLAN meshes, future wireless networks will be expanded...
Sven Wiethölter, Adam Wolisz
TWC
2008
124views more  TWC 2008»
13 years 8 months ago
On the Performance of Distributed Polling Service-based Medium Access Control
It has been shown in the literature that many MAC protocols for wireless networks have a considerable control overhead, which limits their achievable throughput and delay performan...
Yihan Li, Shiwen Mao, Shivendra S. Panwar, Scott F...
TCSV
2010
13 years 3 months ago
Layered Wireless Video Multicast Using Relays
Wireless video multicast enables delivery of popular events to many mobile users in a bandwidth efficient manner. However, providing good and stable video quality to a large number...
Özgü Alay, Thanasis Korakis, Yao Wang, E...