Sciweavers

1880 search results - page 376 / 376
» Mobile Application Profiling for Connected Mobile Devices
Sort
View
INFOCOM
2011
IEEE
12 years 9 months ago
Fully secure pairwise and triple key distribution in wireless sensor networks using combinatorial designs
—We address pairwise and (for the first time) triple key establishment problems in wireless sensor networks (WSN). We use combinatorial designs to establish pairwise keys betwee...
Sushmita Ruj, Amiya Nayak, Ivan Stojmenovic
IWCMC
2009
ACM
14 years 8 days ago
Dynamic trust establishment in emergency ad hoc networks
This paper proposes a dynamic trust establishment protocol that enables the nodes of an ad hoc network to establish security associations among each other in a distributed and pee...
Christos A. Papageorgiou, Konstantinos Birkos, Tas...
JSAC
2010
99views more  JSAC 2010»
13 years 4 months ago
Robust wireless video streaming using hybrid spatial/temporal retransmission
—Bandwidth demands and timing constraints are two major challenges for wireless video streaming applications. In this paper, we present a hybrid spatial/temporal retransmission p...
Mei-Hsuan Lu, Peter Steenkiste, Tsuhan Chen
SENSYS
2010
ACM
13 years 3 months ago
SensLoc: sensing everyday places and paths using less energy
Continuously understanding a user's location context in colloquial terms and the paths that connect the locations unlocks many opportunities for emerging applications. While ...
Donnie H. Kim, Younghun Kim, Deborah Estrin, Mani ...
NETWORK
2008
150views more  NETWORK 2008»
13 years 5 months ago
WiMAX networks: from access to service platform
Recently, WiMAX has been proposed as an attractive wireless communication technology for providing broadband access for metropolitan areas. Despite its salient features from the t...
Kejie Lu, Yi Qian, Hsiao-Hwa Chen, Shengli Fu