Abstract—A prominent application of Wireless Sensor Networks is the monitoring of physical phenomena. The value of the monitored attributes naturally depends on the accuracy of t...
Unauthorized Bluetooth devices or rogue devices can impersonate legitimate devices through address and link key spoofing. Moreover, they can infiltrate a Bluetooth network and ini...
We present the design, implementation and evaluation of an open programmable mobile network based on distributed object technology called mobiware that dynamically exploits the in...
Andrew T. Campbell, Michael E. Kounavis, Raymond R...
— WLANs will become a major portion of the fourth generation (4G) cellular system. The seamless handoff problem in WLANs is a very important design issue to support the new astou...
With the advent of cognitive radio technology, new paradigms for spectrum access can achieve near-optimal spectrum utilisation by letting each user sense and utilise available s...
Joe Bater, Hwee Pink Tan, Kenneth N. Brown, Linda ...