Sciweavers

1150 search results - page 90 / 230
» Beacon Based Authentication
Sort
View
FGCS
2000
131views more  FGCS 2000»
13 years 8 months ago
Keystroke dynamics as a biometric for authentication
More than ever before the Internet is changing computing as we know it. Global access to information and resources is becoming an integral part of nearly every aspect of our lives...
Fabian Monrose, Aviel D. Rubin
MOBISYS
2006
ACM
14 years 8 months ago
Using smart triggers for improved user performance in 802.11 wireless networks
The handoff algorithms in the current generation of 802.11 networks are primarily reactive in nature, because they wait until the link quality degrades substantially to trigger a ...
Vivek Mhatre, Konstantina Papagiannaki
IPSN
2007
Springer
14 years 3 months ago
Underground structure monitoring with wireless sensor networks
Environment monitoring in coal mines is an important application of wireless sensor networks (WSNs) that has commercial potential. We discuss the design of a Structure-Aware Self-...
Mo Li, Yunhao Liu
JUCS
2010
125views more  JUCS 2010»
13 years 7 months ago
Position-based Routing Protocol for Low Power Wireless Sensor Networks
: We present a table-less position based routing scheme for low power data centric wireless sensor networks. Our proposed scheme is localized, uses greedy forwarding approach, and ...
Sajjad Ahmad Madani, Daniel Weber, Stefan Mahlknec...
WIS
2004
13 years 10 months ago
Inter-domain Authentication and Authorization Mechanisms for Roaming SIP Users
: To enable users to utilize the services of various providers of multimedia services based on the session initiation protocol (SIP), some kind of interaction is required between t...
Dorgham Sisalem, Jiri Kuthan