Sciweavers

244 search results - page 24 / 49
» Phishing in the Wireless: Implementation and Analysis
Sort
View
DIALM
2004
ACM
100views Algorithms» more  DIALM 2004»
14 years 1 months ago
Virtual coordinates for ad hoc and sensor networks
In many applications of wireless ad hoc and sensor networks, position-awareness is of great importance. Often, as in the case of geometric routing, it is sufficient to have virtua...
Thomas Moscibroda, Regina O'Dell, Mirjam Wattenhof...
INFOCOM
2010
IEEE
13 years 6 months ago
Designing a Practical Access Point Association Protocol
—In a Wireless Local Area Network (WLAN), the Access Point (AP) selection of a client heavily influences the performance of its own and others. Through theoretical analysis, we ...
Fengyuan Xu, Chiu Chiang Tan, Qun Li, Guanhua Yan,...
CORR
2010
Springer
142views Education» more  CORR 2010»
13 years 2 months ago
M-Learning: A New Paradigm of Learning Mathematics in Malaysia
M-Learning is a new learning paradigm of the new social structure with mobile and wireless technologies. Smart school is one of the four flagship applications for Multimedia Super...
Saipunidzam Mahamad, Mohammad Noor Ibrahim, Shakir...
ICC
2007
IEEE
156views Communications» more  ICC 2007»
14 years 1 months ago
CA-AQM: Channel-Aware Active Queue Management for Wireless Networks
—In a wireless network, data transmission suffers from varied signal strengths and channel bit error rates. To ensure successful packet reception under different channel conditio...
Yuan Xue, Hoang Nguyen, Klara Nahrstedt
IFIP
2004
Springer
14 years 29 days ago
High Throughput Route Selection in Multi-rate Ad Hoc Wireless Networks
Abstract— An ad hoc wireless network is an autonomous selforganizing system of mobile nodes connected by wireless links where nodes not in direct range communicate via intermedia...
Baruch Awerbuch, David Holmer, Herbert Rubens