Sciweavers

267 search results - page 46 / 54
» Wireless Handheld Devices Become Trusted Network Devices
Sort
View
PERCOM
2006
ACM
14 years 7 months ago
A Programmable Service Architecture for Mobile Medical Care
This paper introduces MobiCare ? a novel service architecture that enables a wide range of health-related services for efficient and mobile patient care. These services include: (...
Rajiv Chakravorty
SCN
2008
Springer
157views Communications» more  SCN 2008»
13 years 7 months ago
Insider attack attribution using signal strength-based hyperbolic location estimation
A rogue insider, in a wireless network, is an authenticated member that exploits possession of a valid identity in order to launch an attack. A typical example is the transmission...
Christine Laurendeau, Michel Barbeau
SAINT
2005
IEEE
14 years 1 months ago
Security Architecture for Control Networks using IPsec and KINK
There are many kinds of control networks which have been used in various non-IP network areas, such as BA (Building Automation), FA (Factory Automation) and PA (Process Automation...
Nobuo Okabe, Shoichi Sakane, Kazunori Miyazawa, Ke...
MOBICOM
2010
ACM
13 years 7 months ago
The spaces between us: setting and maintaining boundaries in wireless spectrum access
Guardbands are designed to insulate transmissions on adjacent frequencies from mutual interference. As more devices in a given area are packed into orthogonal wireless channels, c...
Lei Yang, Ben Y. Zhao, Haitao Zheng
ICECCS
2008
IEEE
183views Hardware» more  ICECCS 2008»
14 years 2 months ago
Ambient Intelligence Applications: Introducing the Campus Framework
A challenge for pervasive computing is the seamless integration of computer support with users’ activities in a very dynamic setting, with deep human and resource mobility. Port...
Amal El Fallah-Seghrouchni, Karin Breitman, Nicola...