152
click to vote
MOBICOM
15 years 9 months ago
2006 ACM
In this paper, we present and describe VanetMobiSim, a generator of realistic vehicular movement traces for telecommunication networks simulators. VanetMobiSim mobility descriptio...
170
click to vote
GLOBECOM
15 years 9 months ago
2006 IEEE
— Radio Frequency Identification (RFID) systems have provided promising solutions to effective identification of a large number of tagged objects. However, RFID systems suffer ...
211
click to vote
INFOCOM
15 years 9 months ago
2006 IEEE
Abstract— This paper considers jointly optimal design of crosslayer congestion control, routing and scheduling for ad hoc wireless networks. We first formulate the rate constrai...
162
click to vote
CCN
15 years 4 months ago
2006
Unauthorized Bluetooth devices or rogue devices can impersonate legitimate devices through address and link key spoofing. Moreover, they can infiltrate a Bluetooth network and ini...
201
click to vote
SIGCOMM
15 years 9 months ago
2006 ACM
There is a growing demand for network devices capable of examining the content of data packets in order to improve network security and provide application-specific services. Most...
|