Sciweavers

500 search results - page 50 / 100
» Location privacy in wireless personal area networks
Sort
View
WMTE
2002
IEEE
14 years 18 days ago
To Unlock the Learning Value of Wireless Mobile Devices, Understand Coupling
Handheld computers will become an increasingly compelling choice of technology for K-12 classrooms because they will enable a transition from occasional, supplemental use to frequ...
Jeremy Roschelle, Charles Patton, Roy D. Pea
MOBICOM
2006
ACM
14 years 1 months ago
Video streaming over overlaid bluetooth piconets (OBP)
In a large scale Bluetooth network, scatternet has been regarded as the only interconnection method among piconets. But, most Bluetooth devices do not support scatternet connectio...
Sewook Jung, Alexander Chang, Mario Gerla
PERCOM
2008
ACM
14 years 7 months ago
Topology Formation in IEEE 802.15.4: Cluster-Tree Characterization
The IEEE 802.15.4 standard defines a set of procedures to set-up a Low-Rate Wireless Personal Area Network where nodes self-organize into a logical communication structure through ...
Francesca Cuomo, Sara Della Luna, Petia Todorova, ...
MOBIHOC
2005
ACM
14 years 7 months ago
Toward resilient security in wireless sensor networks
Node compromise poses severe security threats in wireless sensor networks. Unfortunately, existing security designs can address only a small, fixed threshold number of compromised...
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William A....
WS
2006
ACM
14 years 1 months ago
Detecting identity-based attacks in wireless networks using signalprints
Wireless networks are vulnerable to many identity-based attacks in which a malicious device uses forged MAC addresses to masquerade as a specific client or to create multiple ill...
Daniel B. Faria, David R. Cheriton