Sciweavers

13007 search results - page 62 / 2602
» Wireless and Mobile Networking
Sort
View
SDM
2009
SIAM
123views Data Mining» more  SDM 2009»
14 years 6 months ago
Tracking User Mobility to Detect Suspicious Behavior.
Popularity of mobile devices is accompanied by widespread security problems, such as MAC address spoofing in wireless networks. We propose a probabilistic approach to temporal an...
Gaurav Tandon, Philip K. Chan
MIS
2007
Springer
159views Multimedia» more  MIS 2007»
13 years 8 months ago
The application of fluid mobility modelling in wireless cellular networks
Mobility models, synthetic or trace, try to accurately model the movement of a single user or a group of users. Models are used in simulators and emulators to investigate the cons...
Ronan J. Skehill, Sean McGrath
VTC
2007
IEEE
116views Communications» more  VTC 2007»
14 years 3 months ago
Fairness Control by Mobile Routers in On-Board Communication Networks
— Communication solutions for passengers on public transport vehicles, in the form of on-board networks connected to the Internet via a mobile router (MR) and a wireless link, are...
Adeel Baig, Lavy Libman, Mahbub Hassan
NETWORK
2006
218views more  NETWORK 2006»
13 years 8 months ago
Quality of service for packet telephony over mobile ad hoc networks
IP telephony over mobile ad hoc networks is a topic of emerging interest in the research arena as one of the paths toward the fixed-mobile convergence in telecommunications networ...
Paolo Giacomazzi, Luigi Musumeci, Giuseppe Caizzon...
LCN
2006
IEEE
14 years 2 months ago
On Measuring Anonymity For Wireless Mobile Ad-hoc Networks
We propose an evidence theory based anonymity measuring approach for wireless mobile ad-hoc networks. In our approach, an evidence is a measure of the number of detected packets w...
Dijiang Huang