Sciweavers

500 search results - page 47 / 100
» Location privacy in wireless personal area networks
Sort
View
ACE
2004
193views Education» more  ACE 2004»
13 years 9 months ago
Educational Experiences From a Global Software Engineering (GSE) Project
Technological advancement in the Internet and other areas of communication have made the idea of collaborative projects with other people who might be physically located on separa...
Maryam Purvis, Martin K. Purvis, Stephen Cranefiel...
PERCOM
2006
ACM
14 years 7 months ago
The Master Key: A Private Authentication Approach for Pervasive Computing Environments
We propose a novel entity authentication approach for pervasive computing environments. A person uses a single device, the Master Key, which aggregates all his digital forms of ac...
Feng Zhu, Matt W. Mutka, Lionel M. Ni
TMC
2010
138views more  TMC 2010»
13 years 6 months ago
Distributed Relay-Assignment Protocols for Coverage Expansion in Cooperative Wireless Networks
—One important application of cooperative communications is to extend coverage area in wireless networks without increasing infrastructure. However, a crucial challenge in implem...
Ahmed K. Sadek, Zhu Han, K. J. Ray Liu
MOBIHOC
2002
ACM
14 years 7 months ago
On the minimum node degree and connectivity of a wireless multihop network
This paper investigates two fundamental characteristics of a wireless multihop network: its minimum node degree and its k?connectivity. Both topology attributes depend on the spat...
Christian Bettstetter
GLOBECOM
2008
IEEE
13 years 8 months ago
Hierarchical Scanning Algorithm for Integrated Mobile and Nomadic Access Systems
—In next generation wireless networks, not only wide area cells to provide moderate data rate with full mobility but also local area cells to support high data rate with local mo...
Jung-Min Moon, Dong-Ho Cho