Sciweavers

1337 search results - page 194 / 268
» Modeling Time-Variant User Mobility in Wireless Mobile Netwo...
Sort
View
137
Voted
GLOBECOM
2009
IEEE
15 years 7 months ago
Detecting Identity Spoofs in IEEE 802.11e Wireless Networks
Abstract--Wireless networks are vulnerable to identity spoofing attacks, where an attacker can forge the MAC address of his wireless device to assume the identity of another victim...
Gayathri Chandrasekaran, John-Austen Francisco, Vi...
WWW
2004
ACM
16 years 4 months ago
The web around the corner: augmenting the browser with gps
As programmable mobile devices (such as high-end cellular phones and Personal Digital Assistants) became widely adopted, users ask for Internet access on-the-road. While upcoming ...
Davide Carboni, Andrea Piras, Stefano Sanna, Sylva...
114
Voted
PERCOM
2006
ACM
16 years 2 months ago
Enhancing Bluetooth Connectivity with RFID
One of the challenges in pervasive computing is communication between a mobile user's terminal and the continuously changing local environment. Bluetooth is one potential opt...
Timo Salminen, Simo Hosio, Jukka Riekki
INFOCOM
2010
IEEE
15 years 1 months ago
Multicast Scheduling with Cooperation and Network Coding in Cognitive Radio Networks
—Cognitive Radio Networks (CRNs) have recently emerged as a promising technology to improve spectrum utilization by allowing secondary users to dynamically access idle primary ch...
Jin Jin, Hong Xu, Baochun Li
132
Voted
ICIP
2002
IEEE
16 years 5 months ago
Modeling the self-similar behavior of packetized MPEG-4 video using wavelet-based methods
Video streaming has already been very popular on the Internet through services such as news bulletins from different parts of the world and on-demand music-video clips. With rapid...
Brian L. Evans, Dogu Arifler