Sciweavers

1337 search results - page 194 / 268
» Modeling Time-Variant User Mobility in Wireless Mobile Netwo...
Sort
View
GLOBECOM
2009
IEEE
14 years 28 days ago
Detecting Identity Spoofs in IEEE 802.11e Wireless Networks
Abstract--Wireless networks are vulnerable to identity spoofing attacks, where an attacker can forge the MAC address of his wireless device to assume the identity of another victim...
Gayathri Chandrasekaran, John-Austen Francisco, Vi...
WWW
2004
ACM
14 years 9 months ago
The web around the corner: augmenting the browser with gps
As programmable mobile devices (such as high-end cellular phones and Personal Digital Assistants) became widely adopted, users ask for Internet access on-the-road. While upcoming ...
Davide Carboni, Andrea Piras, Stefano Sanna, Sylva...
PERCOM
2006
ACM
14 years 8 months ago
Enhancing Bluetooth Connectivity with RFID
One of the challenges in pervasive computing is communication between a mobile user's terminal and the continuously changing local environment. Bluetooth is one potential opt...
Timo Salminen, Simo Hosio, Jukka Riekki
INFOCOM
2010
IEEE
13 years 7 months ago
Multicast Scheduling with Cooperation and Network Coding in Cognitive Radio Networks
—Cognitive Radio Networks (CRNs) have recently emerged as a promising technology to improve spectrum utilization by allowing secondary users to dynamically access idle primary ch...
Jin Jin, Hong Xu, Baochun Li
ICIP
2002
IEEE
14 years 10 months ago
Modeling the self-similar behavior of packetized MPEG-4 video using wavelet-based methods
Video streaming has already been very popular on the Internet through services such as news bulletins from different parts of the world and on-demand music-video clips. With rapid...
Brian L. Evans, Dogu Arifler