Sciweavers

13007 search results - page 62 / 2602
» Wireless and Mobile Networking
Sort
View
SDM
2009
SIAM
123views Data Mining» more  SDM 2009»
16 years 14 days ago
Tracking User Mobility to Detect Suspicious Behavior.
Popularity of mobile devices is accompanied by widespread security problems, such as MAC address spoofing in wireless networks. We propose a probabilistic approach to temporal an...
Gaurav Tandon, Philip K. Chan
MIS
2007
Springer
159views Multimedia» more  MIS 2007»
15 years 2 months ago
The application of fluid mobility modelling in wireless cellular networks
Mobility models, synthetic or trace, try to accurately model the movement of a single user or a group of users. Models are used in simulators and emulators to investigate the cons...
Ronan J. Skehill, Sean McGrath
VTC
2007
IEEE
116views Communications» more  VTC 2007»
15 years 9 months ago
Fairness Control by Mobile Routers in On-Board Communication Networks
— Communication solutions for passengers on public transport vehicles, in the form of on-board networks connected to the Internet via a mobile router (MR) and a wireless link, are...
Adeel Baig, Lavy Libman, Mahbub Hassan
NETWORK
2006
218views more  NETWORK 2006»
15 years 3 months ago
Quality of service for packet telephony over mobile ad hoc networks
IP telephony over mobile ad hoc networks is a topic of emerging interest in the research arena as one of the paths toward the fixed-mobile convergence in telecommunications networ...
Paolo Giacomazzi, Luigi Musumeci, Giuseppe Caizzon...
LCN
2006
IEEE
15 years 9 months ago
On Measuring Anonymity For Wireless Mobile Ad-hoc Networks
We propose an evidence theory based anonymity measuring approach for wireless mobile ad-hoc networks. In our approach, an evidence is a measure of the number of detected packets w...
Dijiang Huang