Sciweavers

1439 search results - page 21 / 288
» Peer-to-Peer Communication in Wireless Local Area Networks
Sort
View
DCOSS
2010
Springer
13 years 10 months ago
Wireless Jamming Localization by Exploiting Nodes' Hearing Ranges
Jamming attacks are especially harmful when ensuring the dependability of wireless communication. Finding the position of a jammer will enable the network to actively exploit a wid...
Zhenhua Liu, Hongbo Liu, Wenyuan Xu, Yingying Chen
INFOCOM
2010
IEEE
13 years 5 months ago
Group Device Pairing based Secure Sensor Association and Key Management for Body Area Networks
Body Area Networks (BAN) is a key enabling technology in E-healthcare such as remote health monitoring. An important security issue during bootstrap phase of the BAN is to securely...
Ming Li, Shucheng Yu, Wenjing Lou, Kui Ren
AICT
2005
IEEE
157views Communications» more  AICT 2005»
13 years 10 months ago
Fast Retransmission of Real-Time Traffic in HIPERLAN/2 Systems
Automatic repeat request (ARQ) schemes are effective to recover non-real-time data corrupted by channel errors, but their use with real-time traffic is seldom considered because p...
Jose A. Afonso, Joaquim E. Neves
GLOBECOM
2007
IEEE
14 years 2 months ago
Resource Allocation for Conversational, Streaming, and Interactive Services in Cellular/WLAN Interworking
— Multi-service support is an important motivation for interworking between the cellular network and wireless local area networks (WLANs). The complementary strengths of the two ...
Wei Song, Weihua Zhuang