Sciweavers

59 search results - page 8 / 12
» Distributed user authentication in wireless LANs
Sort
View
PERCOM
2004
ACM
14 years 6 months ago
Pervasive Authentication Domains for Automatic Pervasive Device Authorization
In a pervasive computing environment, users have many devices that are used to initiate or answer remote service requests, such as obtaining real-time stock quotes, handling corpo...
Reiner Sailer, James Giles
PE
2007
Springer
100views Optimization» more  PE 2007»
13 years 6 months ago
Remote analysis of a distributed WLAN using passive wireless-side measurement
This paper presents network traffic measurements from a campus-wide wireless LAN (WLAN), with the data collected using remote passive wireless-side measurement. We used commercia...
Aniket Mahanti, Carey L. Williamson, Martin F. Arl...
VTC
2007
IEEE
102views Communications» more  VTC 2007»
14 years 29 days ago
An Efficient HCF Scheduling Mechanism in Mixed Traffic Scenarios
In this paper an efficient scheduling mechanism for wireless local area networks (WLAN) is proposed. This innovative scheme, named hybrid HCCA-EDCA centralised scheme (HHECS), is b...
David Gozalvez, Jose F. Monserrat, Javier Goz&aacu...
MOBIHOC
2006
ACM
14 years 6 months ago
Modeling steady-state and transient behaviors of user mobility: : formulation, analysis, and application
Recent studies on mobility modeling have focused on characterizing user mobility from real traces of wireless LANs (WLANs) and creating mobility models based on such characterizat...
Jong-Kwon Lee, Jennifer C. Hou
ISCAPDCS
2003
13 years 8 months ago
Performance of a Jini-based Ad Hoc Network Authentication Scheme
Ad hoc networks provide a dynamically reconfigurable network infrastructure where entities can participate at will. Jini technology can be used to implement an ad hoc network, and...
M. M. McMahon, D. M. Needham, J. B. Datko