Sciweavers

659 search results - page 11 / 132
» General Modeling and Performance Analysis for Location Manag...
Sort
View
CCS
2001
ACM
14 years 14 hour ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
MOBISYS
2007
ACM
14 years 7 months ago
Preserving location privacy in wireless lans
The broadcast and tetherless nature of wireless networks and the widespread deployment of Wi-Fi hotspots makes it easy to remotely locate a user by observing her wireless signals....
Tao Jiang, Helen J. Wang, Yih-Chun Hu
COMSWARE
2008
IEEE
14 years 2 months ago
Experimental analysis of RSSI-based location estimation in wireless sensor networks
—With a widespread increase in the number of mobile wireless systems and applications, the need for location aware services has risen at a very high pace in the last few years. M...
Mohit Saxena, Puneet Gupta, Bijendra N. Jain
MSWIM
2000
ACM
13 years 12 months ago
Performance analysis of mobile agents for filtering data streams on wireless networks
Wireless networks are an ideal environment for mobile agents, because their mobility allows them to move across an unreliable link to reside on a wired host, next to or closer to ...
David Kotz, Guofei Jiang, Robert S. Gray, George C...
IPSN
2004
Springer
14 years 26 days ago
Naps: scalable, robust topology management in wireless ad hoc networks
Topology management schemes conserve energy in wireless ad hoc networks by identifying redundant nodes that may turn off their radios or other components while maintaining connec...
Brighten Godfrey, David Ratajczak