Sciweavers

179 search results - page 16 / 36
» On the move, wirelessly connected to the world
Sort
View
IDEAS
2008
IEEE
256views Database» more  IDEAS 2008»
14 years 4 months ago
WIDS: a sensor-based online mining wireless intrusion detection system
This paper proposes WIDS, a wireless intrusion detection system, which applies data mining clustering technique to wireless network data captured through hardware sensors for purp...
Christie I. Ezeife, Maxwell Ejelike, Akshai K. Agg...
WSKS
2009
Springer
14 years 4 months ago
Improving Access to Services through Intelligent Contents Adaptation: The SAPI Framework
Nowadays, every public or private company has to provide the access to their services through Internet. Unfortunately, the access channels and devices increase both in numbers and ...
Nicola Capuano, Gaetano Rocco De Maio, Pierluigi R...
INFOCOM
2009
IEEE
14 years 4 months ago
Routing Over Multi-Hop Wireless Networks with Non-Ergodic Mobility
—Routing to mobile nodes in a wireless network is conventionally performed by associating a static IP address (or a geographic location) to each node, and routing to that address...
Chris Milling, Sundar Subramanian, Sanjay Shakkott...
MOBICOM
2004
ACM
14 years 3 months ago
Reducing MAC layer handoff latency in IEEE 802.11 wireless LANs
With the growth of IEEE 802.11-based wireless LANs, VoIP and similar applications are now commonly used over wireless networks. Mobile station performs a handoff whenever it move...
Sangho Shin, Andrea G. Forte, Anshuman Singh Rawat...
CSREASAM
2006
13 years 11 months ago
On Security in TCP/IP over Wireless Network
- The Transmission Control Protocol/Internet Protocol (TCP/IP) is combination of different protocols at various layers. TCP/IP is the basic communication language or protocol of th...
Shamila Makki, Wunnava V. Subbarao