Sciweavers

1337 search results - page 20 / 268
» Modeling Time-Variant User Mobility in Wireless Mobile Netwo...
Sort
View
EUROMICRO
2004
IEEE
13 years 11 months ago
Handover in Mobile Communication Networks: Who is in Control Anyway?
The migration from 3rd generation mobile communication networks to 4th generation, purely IP-based networks leads to new chances, but also great risks for the traditional mobile n...
Frank A. Zdarsky, Jens B. Schmitt
CODASPY
2011
12 years 11 months ago
Privacy-preserving activity scheduling on mobile devices
—Progress in mobile wireless technology has resulted in the increased use of mobile devices to store and manage users’ personal schedules. Users also access popular contextbase...
Igor Bilogrevic, Murtuza Jadliwala, Jean-Pierre Hu...
ICC
2007
IEEE
142views Communications» more  ICC 2007»
14 years 2 months ago
Performance Evaluation of Network Systems Accounting for User Behaviors
—Considering user behaviors in the performance evaluation of mobile networks is crucial as traffic generation in such networks is highly dependent on mobility and communication a...
Shigeru Kaneda, Akihito Hiromori, Yoshikazu Akinag...
PEWASUN
2004
ACM
14 years 1 months ago
A novel solution for achieving anonymity in wireless ad hoc networks
A mobile ad hoc network consists of mobile nodes that can move freely in an open environment. Communicating nodes in a wireless and mobile ad hoc network usually seek the help of ...
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry...
INFOCOM
2011
IEEE
12 years 11 months ago
Identity-based attack detection in mobile wireless networks
—Identity-based attacks (IBAs) are one of the most serious threats to wireless networks. Recently, received signal strength (RSS) based detection mechanisms were proposed to dete...
Kai Zeng, Kannan Govindan, Daniel Wu, Prasant Moha...