Sciweavers

745 search results - page 138 / 149
» Proxy-based security protocols in networked mobile devices
Sort
View
IWCMC
2006
ACM
14 years 2 months ago
Proposal for a cross-layer coordination framework for next generation wireless systems
Cross-Layer design has been the focus of several recent research efforts. Due to the highly variable nature of the links used in wireless communication systems and the resource-po...
Karim M. El Defrawy, Magda El Zarki, Mohamed M. Kh...
TPDS
2010
112views more  TPDS 2010»
13 years 7 months ago
Resource Scheduling in Wireless Networks Using Directional Antennas
—Due to a continued increase in the speed and capacities of computing devices, combined with our society’s growing need for mobile communication capabilities, multihop wireless...
Imad Jawhar, Jie Wu, Dharma P. Agrawal
INFOCOM
2010
IEEE
13 years 7 months ago
Retiring Replicants: Congestion Control for Intermittently-Connected Networks
Abstract—The widespread availability of mobile wireless devices offers growing opportunities for the formation of temporary networks with only intermittent connectivity. These in...
Nathanael Thompson, Samuel C. Nelson, Mehedi Bakht...
INFOCOM
2010
IEEE
13 years 6 months ago
HaND: Fast Handoff with Null Dwell Time for IEEE 802.11 Networks
How to reduce the handoff delay and how to make appropriate handoff decisions are two fundamental challenges in designing an effective handoff scheme for 802.11 networks to provide...
Xi Chen, Daji Qiao
SEC
2003
13 years 10 months ago
Providing Voice Privacy Over Public Switched Telephone Networks
: The public telephone network has been evolving from manually switched wires carrying analog encoded voice of the 19th century to an automatically switched grid of copper-wired, f...
Mohamed Sharif, Duminda Wijesekera