Sciweavers

1557 search results - page 251 / 312
» Security and Cooperation in Wireless Networks
Sort
View
IWCMC
2009
ACM
14 years 3 months ago
Joint turbo equalization for relaying schemes over frequency-selective fading channels
We propose a single carrier joint frequency domain equalization and interference cancellation (FDE-IC) with diversity combining for different relaying schemes. We consider amplif...
Houda Chafnaji, Tarik Ait-Idir, Halim Yanikomerogl...
PERCOM
2005
ACM
14 years 8 months ago
Enabling Reliable Many-to-Many Communication in Ad-Hoc Pervasive Environments
In order for pervasive computing to realize its full potential, pervasive applications have to be able to operate without support from fixed communication infrastructure at least ...
Einar Vollset, Paul D. Ezhilchelvan
WOWMOM
2005
ACM
129views Multimedia» more  WOWMOM 2005»
14 years 2 months ago
Lightweight Replication Middleware for Data and Service Components in Dense MANETs
The increasing diffusion of wireless-enabled portable devices is pushing towards service provisioning over dense Mobile Ad-hoc NETworks (MANETs), i.e., limited spatial regions, su...
Paolo Bellavista, Antonio Corradi, Eugenio Magistr...
TMC
2010
179views more  TMC 2010»
13 years 7 months ago
On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews
We explore the use of clock skew of a wireless local area network access point (AP) as its fingerprint to detect unauthorized APs quickly and accurately. The main goal behind usi...
Suman Jana, Sneha Kumar Kasera
MOBIHOC
2008
ACM
14 years 8 months ago
P2P-based routing and data management using the virtual cord protocol (VCP)
We present Virtual Cord Protocol (VCP), a virtual relative position based routing protocol for sensor networks that also provides methods for data management as known from standar...
Abdalkarim Awad, Reinhard German, Falko Dressler