Sciweavers

2507 search results - page 480 / 502
» Wireless Network Information Flow
Sort
View
UIC
2009
Springer
14 years 2 months ago
Implicit User Re-authentication for Mobile Devices
Abstract. Portable computers are used to store and access sensitive information. They are frequently used in insecure locations with little or no physical protection, and are there...
Sausan Yazji, Xi Chen, Robert P. Dick, Peter Scheu...
FGCN
2008
IEEE
199views Communications» more  FGCN 2008»
14 years 2 months ago
A Context-Sensitive Rule-Based Architecture for a Smart Building Environment
In a smart building environment nomadic users can benefit from specialised contextsensitive services. These can increase productivity and offer an improved lifestyle for users. Th...
John Herbert, John O'Donoghue, Xiang Chen
INFOCOM
2008
IEEE
14 years 2 months ago
Towards a Theory of Robust Localization Against Malicious Beacon Nodes
—Localization in the presence of malicious beacon nodes is an important problem in wireless networks. Although significant progress has been made on this problem, some fundament...
Sheng Zhong, Murtuza Jadliwala, Shambhu J. Upadhya...
VTC
2008
IEEE
113views Communications» more  VTC 2008»
14 years 2 months ago
Non-Linear UWB Receivers with MLSE Post-Detection
— A wireless body area network with an average throughput of 500 kbps is considered based on ultra-wideband (UWB) pulse position modulation. For a long battery autonomy ultra low...
Florian Troesch, Thomas Zasowski, Armin Wittneben
ICC
2007
IEEE
14 years 2 months ago
A Novel Piggyback Selection Scheme in IEEE 802.11e HCCA
— A control frame can be piggybacked in a data frame to increase the channel efficiency in a wireless communication such as IEEE 802.11 WLAN. However, the piggyback scheme may c...
Hyun-Jin Lee, Jae-Hyun Kim, Sunghyun Cho