Sciweavers

1337 search results - page 106 / 268
» Modeling Time-Variant User Mobility in Wireless Mobile Netwo...
Sort
View
MOBIQUITOUS
2007
IEEE
14 years 3 months ago
Key Establishment Using Secure Distance Bounding Protocols
Key establishment is one of the major challenges in Wireless Personal Area Networks, as traditional security mechanisms often do not cope with the dynamic characteristics of wirel...
Dave Singelée, Bart Preneel
MSWIM
2005
ACM
14 years 2 months ago
Application of synchronous dynamic encryption system in mobile wireless domains
Motivated by the tradeoff between security and efficiency performance parameters that has been imposed on all modern wireless security protocols, we designed a novel security syst...
Hamdy S. Soliman, Mohammed Omari
AINA
2007
IEEE
14 years 3 months ago
A Utility-Based Adaptivity Model for Mobile Applications
Mobile environments are characterized by resource fluctuations and limitations, and variations in user preferences. Therefore mobile applications need to be adaptive to retain us...
Mourad Alia, Viktor S. Wold Eide, Nearchos Paspall...

Publication
453views
15 years 7 months ago
System Level Modeling of IEEE 802.16e Mobile WiMAX Networks: Key Issues
WiMAX has attracted a lot of attention recently in the telecommunication community including researchers, product developers and service providers. Numerous papers have been publis...
Raj Jain, Chakchai So-In, and Abdel-Karim Al Tamim...
IJHCR
2010
131views more  IJHCR 2010»
13 years 6 months ago
Opportunistic Software Deployment in Disconnected Mobile Ad Hoc Networks
This paper presents a middleware platform allowing the dissemination of software components on handheld devices forming a disconnected MANET. It is based on a model that exploits ...
Frédéric Guidec, Nicolas Le Sommer, ...