Sciweavers

235 search results - page 18 / 47
» A Marketing Model for Mobile Wireless Services
Sort
View
SUTC
2006
IEEE
15 years 7 months ago
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation
Security in wireless ad hoc networks is hard to achieve due to the vulnerability of its links, limited physical protection, and the absence of a centralized management point. Cons...
Edith C. H. Ngai, Michael R. Lyu
ICIP
2002
IEEE
16 years 3 months ago
Modeling the self-similar behavior of packetized MPEG-4 video using wavelet-based methods
Video streaming has already been very popular on the Internet through services such as news bulletins from different parts of the world and on-demand music-video clips. With rapid...
Brian L. Evans, Dogu Arifler
IJDE
2007
105views more  IJDE 2007»
15 years 1 months ago
Mobile Phone Forensics Tool Testing: A Database Driven Approach
The Daubert process used in the admissibility of evidence contains major guidelines applied in assessing forensic procedures, two of which are testing and error rates. The Digital...
Ibrahim M. Baggili, Richard Mislan, Marcus Rogers
VTC
2007
IEEE
15 years 8 months ago
Modeling UpLink Power Control with Outage Probabilities
We investigate models for uplink interference in wireless systems. Our models account for the effects of outage probabilities. Such an accounting requires a nonlinear, even nonco...
Kenneth L. Clarkson, K. Georg Hampel, John D. Hobb...
ICC
2009
IEEE
107views Communications» more  ICC 2009»
15 years 8 months ago
Dynamic Resource Modeling for Heterogeneous Wireless Networks
— High variability of access resources in heterogenous wireless networks and limited computing power and battery life of mobile computing devices such as smartphones call for nov...
Dimitrios Tsamis, Tansu Alpcan, Jatinder Pal Singh...