Sciweavers

1938 search results - page 167 / 388
» Structure of Service Areas in Wireless Communication Network...
Sort
View
GLOBECOM
2009
IEEE
14 years 1 months ago
Detecting Identity Spoofs in IEEE 802.11e Wireless Networks
Abstract--Wireless networks are vulnerable to identity spoofing attacks, where an attacker can forge the MAC address of his wireless device to assume the identity of another victim...
Gayathri Chandrasekaran, John-Austen Francisco, Vi...
MOBICOM
2006
ACM
14 years 3 months ago
Experimental evaluation and characterization of the magnets wireless backbone
High-speed wireless backbones have the potential to replace or complement wired connections. This paper provides a comprehensive network and transport layer performance evaluation...
Roger Karrer, Istvan Matyasovszki, Alessio Botta, ...
ICC
2007
IEEE
139views Communications» more  ICC 2007»
14 years 3 months ago
Generic Centralized Downlink Scheduler for Next Generation Wireless Cellular Networks
– Future wireless cellular networks such as High Speed Downlink Packet Access (HSDPA) and 1x EVolution Data Optimized (1xEV-DO) promise to revolutionize the mobile user’s wirel...
Bader Al-Manthari, Najah A. Abu Ali, Nidal Nasser,...
ICW
2005
IEEE
209views Communications» more  ICW 2005»
14 years 2 months ago
Evaluation of Security Mechanisms in Wireless Sensor Networks
— Ad hoc and wireless sensor networks have recently emerged as successful technologies in a number of application domains. The need to build security services into them remains h...
Germano Guimarães, Eduardo Souto, Djamel Fa...
GLOBECOM
2010
IEEE
13 years 7 months ago
Energy-Aware Real-Time Opportunistic Routing for Wireless Ad Hoc Networks
Existing studies on the design of routing protocols for wireless ad hoc networks mainly focused on energy efficiency. However, in many real-time applications such as target trackin...
Wei Yang, Weifa Liang, Wenhua Dou