Sciweavers

216 search results - page 25 / 44
» Design of Call Control Signaling in Wireless ATM Networks
Sort
View
WS
2006
ACM
14 years 3 months ago
Detecting identity-based attacks in wireless networks using signalprints
Wireless networks are vulnerable to many identity-based attacks in which a malicious device uses forged MAC addresses to masquerade as a specific client or to create multiple ill...
Daniel B. Faria, David R. Cheriton
IJCNN
2007
IEEE
14 years 4 months ago
Optimal Control of a Photovoltaic Solar Energy System with Adaptive Critics
- This paper presents an optimal energy control scheme for a grid independent photovoltaic (PV) solar system consisting of a PV array, battery energy storage, and time varying load...
Richard L. Welch, Ganesh K. Venayagamoorthy
GLOBECOM
2006
IEEE
14 years 3 months ago
Mobility Modeling and Handoff Analysis for IP/MPLS-Based Cellular Networks
Abstract— One of the major challenges for the wireless networks is related to efficient mobility management issue. In this paper, we propose a new micro-mobility management sche...
Rami Langar, Nizar Bouabdallah, Samir Tohmé...
PERCOM
2006
ACM
14 years 9 months ago
Criticality Aware Access Control Model for Pervasive Applications
In this paper we present a new framework for specifying access control policies in smart spaces called Criticality-Aware Access Control (CAAC). The main idea is to automatically r...
Sandeep K. S. Gupta, Tridib Mukherjee, Krishna K. ...
COMCOM
2006
112views more  COMCOM 2006»
13 years 9 months ago
Performance modelling and evaluation of IEEE 802.11 distributed coordination function in multihop wireless networks
Initially designed for WLAN's, IEEE 802.11 medium access control (MAC) has also been widely used in the research of multihop wireless networks. The core MAC technique of IEEE ...
Jun He, Hung Keng Pung