Sciweavers

745 search results - page 75 / 149
» Proxy-based security protocols in networked mobile devices
Sort
View
WS
2005
ACM
14 years 2 months ago
Modeling epidemic spreading in mobile environments
The growing popularity of mobile networks makes them increasingly attractive to virus writers, and malicious code targeting mobile devices has already begun to appear. Unfortunate...
James W. Mickens, Brian D. Noble
ICIP
2002
IEEE
14 years 10 months ago
SPIN-IT: a data centric routing protocol for image retrieval in wireless networks
In this paper, we propose and analyze a routing protocol for mobile ad hoc networks that supports efficient image retrieval based on metadata queries. In digital photography, meta...
Edward Woodrow, Wendi Rabiner Heinzelman
VTC
2006
IEEE
179views Communications» more  VTC 2006»
14 years 2 months ago
An Efficient Handover Scheme Based on Fast Mobile IPv6
— Handover of a call from wireless LAN (WLAN) to third generation cellular system and vice versa is one of the challenges faced by the integrated 3G-WLAN networks. Evolution of 3...
Shanthy Menezes, S. Venkatesan, Kwang-hyun Rho
TRIDENTCOM
2010
IEEE
13 years 6 months ago
ASSERT: A Wireless Networking Testbed
Abstract. As wireless networks become a critical part of home, business and industrial infrastructure, researchers will meet these demands by providing new networking technologies....
Ehsan Nourbakhsh, Jeff Dix, Paul Johnson, T. Ryan ...
ICPP
2005
IEEE
14 years 2 months ago
BluePower - A New Distributed Multihop Scatternet Formation Protocol for Bluetooth Networks
Bluetooth is a promising local area wireless technology designed to establish both personal area and multihop ad hoc networks. In this paper, we present BluePower as a novel and p...
Yuanrui Zhang, Shu Liu, Weijia Jia, Xu Cheng