Sciweavers

16 search results - page 3 / 4
» Improved User Identity Confidentiality for UMTS Mobile Netwo...
Sort
View
MOBIWAC
2009
ACM
14 years 15 days ago
Protocol design and analysis of a HIP-based per-application mobility management platform
Rapid evolution of wireless networking has provided wide-scale of different wireless access technologies like Bluetooth, ZigBee, 802.11a/b/g, DSRC, 3G UMTS, LTE, WiMAX, etc. The c...
László Bokor, László T...
IJWIN
2002
154views more  IJWIN 2002»
13 years 5 months ago
Connection Admission Control for PCS-to-Internet Protocol Internetworking
This paper studies the connection admission control for PCS-to-Internet protocol internetworking. In order to provide QoS to the Internet and avoid scalability problems, several re...
Fei Yu, Victor C. M. Leung
ICUMT
2009
13 years 3 months ago
Performance of relay-enabled uplink in cellular networks - a flow level analysis
Uplink users in cellular networks, such as UMTS/ HSPA, located at the edge of the cell generally suffer from poor channel conditions. Deploying intermediate relay nodes is seen as ...
Desislava C. Dimitrova, Hans van den Berg, Geert J...
ACSC
2005
IEEE
13 years 11 months ago
A File Discovery Control Scheme for P2P File Sharing Applications in Wireless Mobile Environments
The mobility characteristic brings new challenges for research of P2P computing over the wireless mobile networking environment. Peers’ movements in wireless mobile network chan...
Chung-Ming Huang, Tz-Heng Hsu, Ming-Fa Hsu
MOBISYS
2007
ACM
14 years 5 months ago
Preserving location privacy in wireless lans
The broadcast and tetherless nature of wireless networks and the widespread deployment of Wi-Fi hotspots makes it easy to remotely locate a user by observing her wireless signals....
Tao Jiang, Helen J. Wang, Yih-Chun Hu