Sciweavers

WOWMOM
2006
ACM
195views Multimedia» more  WOWMOM 2006»
15 years 2 months ago
Can I Add a Secure VoIP Call?
— Voice over IP is a major trend in applications for wireless networks, but even so it is not immune to the risks usually related with IP networks. Proposed solutions for VoIP se...
Arlen Nascimento, Alexandre Passito, Edjair de Sou...
WOWMOM
2006
ACM
191views Multimedia» more  WOWMOM 2006»
15 years 2 months ago
Privacy Preserving Trust Authorization Framework Using XACML
: Nowadays many organisations share sensitive services through open network systems and this raises the need for an authorization framework that can interoperate even when the part...
Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, ...
WOWMOM
2006
ACM
168views Multimedia» more  WOWMOM 2006»
15 years 2 months ago
Modeling Node Compromise Spread in Wireless Sensor Networks Using Epidemic Theory
Motivated by recent surfacing viruses that can spread over the air interfaces, in this paper, we investigate the potential disastrous threat of node compromise spreading in wirele...
Pradip De, Yonghe Liu, Sajal K. Das
WOWMOM
2006
ACM
162views Multimedia» more  WOWMOM 2006»
15 years 2 months ago
Gauging VoIP Call Quality from 802.11 WLAN Resource Usage
In this paper we experimentally study the relationship between resource utilization in the wireless LAN and the quality of VoIP calls transmitted over the wireless medium. Specifi...
Miroslaw Narbutt, Mark Davis
WOWMOM
2006
ACM
158views Multimedia» more  WOWMOM 2006»
15 years 2 months ago
Resource Control for the EDCA Mechanism in Multi-Rate IEEE 802.11e Networks
We investigate the problem of efficient resource control for elastic traffic in IEEE 802.11e’s Enhanced Distributed Channel Access (EDCA) mechanism. Our approach considers an ...
Vasilios A. Siris, Costas Courcoubetis
Multimedia
Top of PageReset Settings