Sciweavers

430 search results - page 35 / 86
» Securing Layer 2 in Local Area Networks
Sort
View
CSREASAM
2008
13 years 9 months ago
Secure Resource Sharing in Ad hoc Networks
Abstract Mobile and wireless devices become more popular and their capabilities increase as well. At the same time, most of the today's PC power is unused, as a study of the G...
Michaela Greiler, Peter Schartner
SIGMOD
2003
ACM
121views Database» more  SIGMOD 2003»
14 years 8 months ago
An environmental sensor network to determine drinking water quality and security
Finding patterns in large, real, spatio/temporal data continues to attract high interest (e.g., sales of products over space and time, patterns in mobile phone users; sensor netwo...
Anastassia Ailamaki, Christos Faloutsos, Paul S. F...
WISEC
2010
ACM
14 years 3 months ago
Effectiveness of distance-decreasing attacks against impulse radio ranging
We expose the vulnerability of an emerging wireless ranging technology, impulse radio ultra-wide band (IR-UWB), to distance-decreasing attacks on the physical communication layer ...
Manuel Flury, Marcin Poturalski, Panos Papadimitra...
NETWORKING
2004
13 years 9 months ago
On the Feasibility of Integrated MPEG Teleconference and Data Transmission, over IEEE 802.11 WLANs
The most widespread Wireless Local Area Networks (WLANs) are based today on the IEEE 802.11 standard and its various versions, especially the IEEE 802.11b. In this article we first...
Ioannis Broustis, Michael Paterakis
WCNC
2008
IEEE
14 years 2 months ago
Performance Comparison of Uplink WLANs with Single-User and Multi-User MIMO Schemes
— In this paper, we compare the performance of wireless local area networks (WLANs) with single-user MIMO (SU-MIMO) and multi-user MIMO (MU-MIMO) in terms of collision probabilit...
Hu Jin, Bang Chul Jung, Ho Young Hwang, Dan Keun S...