Sciweavers

745 search results - page 139 / 149
» Proxy-based security protocols in networked mobile devices
Sort
View
RAM
2008
IEEE
172views Robotics» more  RAM 2008»
14 years 3 months ago
VT Position Code Communication Technology and Its Implementation
Eelectronic device technology has been monopolized by binary system for many years. The circs not only makes it impossible to break through the existing technology bottleneck, but...
ShiYing Zhou, GuiHe Qin, YuBo Jin
PERCOM
2007
ACM
14 years 8 months ago
BlueTorrent: Cooperative content sharing for Bluetooth users
People wish to enjoy their everyday lives in various ways, among which entertainment plays a major role. In order to improve lifestyle with more ready access to entertainment cont...
Sewook Jung, Uichin Lee, Alexander Chang, Dae-Ki C...
MOBICOM
2009
ACM
14 years 3 months ago
SAM: enabling practical spatial multiple access in wireless LAN
Spatial multiple access holds the promise to boost the capacity of wireless networks when an access point has multiple antennas. Due to the asynchronous and uncontrolled nature of...
Kun Tan, He Liu, Ji Fang, Wei Wang, Jiansong Zhang...
IWQOS
2004
Springer
14 years 2 months ago
On quality-of-service and energy consumption tradeoffs in FEC-encoded audio streaming
This paper addresses the energy consumption of forward error correction (FEC) protocols as used to improve quality-of-service (QoS) for wireless computing devices. The paper also ...
Zhinan Zhou, Philip K. McKinley, Seyed Masoud Sadj...
INFOCOM
2007
IEEE
14 years 3 months ago
Modeling Malware Propagation in Networks of Smart Cell Phones with Spatial Dynamics
Abstract— Recent outbreaks of virus and worm attacks targeted at cell phones have have bought to the forefront the seriousness of the security threat to this increasingly popular...
Krishna K. Ramachandran, Biplab Sikdar