Sciweavers

1597 search results - page 152 / 320
» Securing Wireless Data: System Architecture Challenges
Sort
View
140
Voted
MOBISYS
2009
ACM
16 years 3 months ago
Point&Connect: intention-based device pairing for mobile phone users
Point&Connect (P&C) offers an intuitive and resilient device pairing solution on standard mobile phones. Its operation follows the simple sequence of point-and-connect: wh...
Chunyi Peng, Guobin Shen, Yongguang Zhang, Songwu ...
119
Voted
DAC
2009
ACM
15 years 10 months ago
Information hiding for trusted system design
For a computing system to be trusted, it is equally important to verify that the system performs no more and no less functionalities than desired. Traditional testing and verifica...
Junjun Gu, Gang Qu, Qiang Zhou
124
Voted
MOBIHOC
2009
ACM
16 years 3 months ago
Delay and effective throughput of wireless scheduling in heavy traffic regimes: vacation model for complexity
Distributed scheduling algorithms for wireless ad hoc networks have received substantial attention over the last decade. The complexity levels of these algorithms span a wide spec...
Yung Yi, Junshan Zhang, Mung Chiang
ADT
2005
15 years 3 months ago
Multimedia communication in wireless sensor networks
Abstract-- The technological advances in Micro ElectroMechanical Systems (MEMS) and wireless communications have enabled the realization of wireless sensor networks (WSN) comprised...
Eren Gürses, Özgür B. Akan
WOWMOM
2009
ACM
151views Multimedia» more  WOWMOM 2009»
15 years 10 months ago
Distributed user authentication in wireless LANs
—An increasing number of mobile devices, including smartphones, use WLAN for accessing the Internet. Existing WLAN authentication mechanisms are either disruptive, such as presen...
Dmitriy Kuptsov, Andrey Khurri, Andrei Gurtov