Sciweavers

1597 search results - page 53 / 320
» Securing Wireless Data: System Architecture Challenges
Sort
View
114
Voted
TRIDENTCOM
2005
IEEE
15 years 9 months ago
A Practical Approach for 4G Systems: Deployment of Overlay Networks
Experimental activities play a vital role in the deployment and development of novel radio access networks. In particular the movement from 3G to 4G poses new challenges, which ne...
Pablo Vidales, Glenford E. Mapp, Frank Stajano, Jo...
MMMACNS
2005
Springer
15 years 9 months ago
Self-managed Cells for Ubiquitous Systems
Abstract. Amongst the challenges of ubiquitous computing is the need to provide management support for personal wireless devices and sensors. In this extended abstract we introduce...
Naranker Dulay, Emil C. Lupu, Morris Sloman, Joe S...
130
Voted
MSWIM
2006
ACM
15 years 9 months ago
Two methods of authenticated positioning
Recent studies and publications have shown a demand for a secure method to proof someones or somenthings position via a communication channel. In this paper we present a concept a...
Thomas Mundt
MOBICOM
2003
ACM
15 years 8 months ago
DIRAC: a software-based wireless router system
Routers are expected to play an important role in the IPbased wireless data network. Although a substantial number of techniques have been proposed to improve wireless network per...
Petros Zerfos, Gary Zhong, Jerry Cheng, Haiyun Luo...
151
Voted
HICSS
2003
IEEE
174views Biometrics» more  HICSS 2003»
15 years 8 months ago
Semantic Interoperability in the Fixed Income Securities Industry: A Knowledge Representation Architecture for Dynamic Integrati
We examine a knowledge representation architecture to support context interchange mediation. For autonomous receivers and sources sharing a common subject domain, the mediator’s...
Allen Moulton, Stuart E. Madnick, Michael Siegel