Sciweavers

10950 search results - page 90 / 2190
» Future wireless networks
Sort
View
WMTE
2005
IEEE
14 years 3 months ago
Supporting Classroom Activities with the BSUL Environment
In this paper we present our ongoing research about the integration of ubiquitous computing systems into classroom settings, in order to give basic support for some classroom and ...
Nobuji A. Saito, Hiroaki Ogata, Rosa G. J. Paredes...
ESAS
2007
Springer
14 years 1 months ago
The Candidate Key Protocol for Generating Secret Shared Keys from Similar Sensor Data Streams
Secure communication over wireless channels necessitates authentication of communication partners to prevent man-in-the-middle attacks. For spontaneous interaction between independ...
Rene Mayrhofer
WINET
2010
129views more  WINET 2010»
13 years 8 months ago
Characterizing 802.11 wireless link behavior
Since wireless signals propagate through the ether, they are significantly affected by attenuation, fading, multipath, and interference. As a result, it is difficult to measure ...
Glenn Judd, Peter Steenkiste
TON
2010
157views more  TON 2010»
13 years 4 months ago
Random Access Game and Medium Access Control Design
We study the contention/interaction among wireless nodes and med -ium access control design in game theory framework. We define a general class of games, called random access game...
Lijun Chen, Steven H. Low, John C. Doyle
ICDCSW
2007
IEEE
14 years 4 months ago
Object-Swapping for Resource-Constrained Devices
Mobile devices are still memory-constrained when compared to desktop and laptop computers. Thus, in some circumstances, even while occupied by useful objects, some memory must be ...
Luís Veiga, Paulo Ferreira