Sciweavers

1597 search results - page 185 / 320
» Securing Wireless Data: System Architecture Challenges
Sort
View
IMC
2010
ACM
13 years 7 months ago
The effect of packet loss on redundancy elimination in cellular wireless networks
Network-level redundancy elimination (RE) algorithms reduce traffic volume on bandwidth-constrained network paths by avoiding the transmission of repeated byte sequences. Previous...
Cristian Lumezanu, Katherine Guo, Neil Spring, Bob...
AINA
2010
IEEE
13 years 24 days ago
A Novel Cross Layer Intrusion Detection System in MANET
— Intrusion detection System forms a vital component of internet security. To keep pace with the growing trends, there is a critical need to replace single layer detection techno...
Rakesh Shrestha, Kyong-Heon Han, Dong-You Choi, Se...
MSWIM
2005
ACM
14 years 2 months ago
Fast pre-authentication based on proactive key distribution for 802.11 infrastructure networks
Recently, user mobility in wireless data networks is increasing because of the popularity of portable devices and the desire for voice and multimedia applications. These applicati...
Mohamed Kassab, Abdelfattah Belghith, Jean-Marie B...
JCM
2007
101views more  JCM 2007»
13 years 9 months ago
Considering a Non-Uniform Filter Bank in an UWB Multi Band On-Off Keying Transceiver
— Ultra Wide Band (UWB) wireless systems based on impulse radio have the potential to provide very high data rates over short distances. One of the solutions for the UWB communic...
Martha Liliana Suárez Peñaloza, Gene...
DAC
1998
ACM
14 years 10 months ago
WELD - An Environment for Web-based Electronic Design
Increasing size and geographical separation of design data and teams has created a need for a network-based electronic design environment that is scaleable, adaptable, secure, hig...
Francis L. Chan, Mark D. Spiller, A. Richard Newto...