Sciweavers

1746 search results - page 203 / 350
» Current and future applications of mobile and wireless netwo...
Sort
View
ESAS
2007
Springer
14 years 29 days ago
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...
Rene Mayrhofer
SPRINGSIM
2007
13 years 10 months ago
An architecture for wireless simulation in NS-2 applied to impulse-radio ultra-wide band networks
We present an architecture for implementing a wireless physical layer in a packet-based network simulator. We integrate this architecture in the popular ns-2 network simulator and...
Ruben Merz, Jean-Yves Le Boudec, Jörg Widmer
TMC
2010
125views more  TMC 2010»
13 years 3 months ago
Threshold-Based Media Streaming Optimization for Heterogeneous Wireless Networks
The integration of different wireless access technologies combined with the huge characteristic diversity of supported services in next-generation wireless systems creates a real h...
Ahmed H. Zahran, Cormac J. Sreenan
ICPPW
2003
IEEE
14 years 2 months ago
Security Aspects of Wireless Heterogeneous Databases - Protocol, Performance, and Energy Analysis
Users have been demanding information “anytime, anywhere”. The notion of accessing diverse and autonomous information repositories with different APIs is not accepted. This ha...
Harshal Haridas, Ali R. Hurson, Yu Jiao
AICT
2008
IEEE
186views Communications» more  AICT 2008»
14 years 3 months ago
Towards High Quality VoIP in 3G Networks - An Empirical Study
—Third generation (3G) packet switched WCDMA networks with high-speed downlink packet access (HSPDA) are currently being deployed worldwide to provide wireless broadband connecti...
Andres Arjona, Cédric Westphal, Antti Yl&au...