Sciweavers

201 search results - page 5 / 41
» Applications and Security of Next-Generation, User-Centric W...
Sort
View
TRIDENTCOM
2005
IEEE
15 years 3 months ago
Addressing Repeatability in Wireless Experiments using ORBIT Testbed
With the rapid growth in research activity on future wireless networking applications and protocols, experimental study and validation is becoming an increasingly important tool t...
Sachin Ganu, Haris Kremo, Richard E. Howard, Ivan ...
CSREAPSC
2006
14 years 10 months ago
Ubiquitous Security: Privacy versus Protection
- In the ambient computing future, security promises to be the foundational design feature that allows pervasive systems to protect personal information privacy. As fledgling perva...
Timothy Buennemeyer, Randolph Marchany, Joseph G. ...
RTAS
2009
IEEE
15 years 4 months ago
Real-Time Video Surveillance over IEEE 802.11 Mesh Networks
In recent years, there has been an increase in video surveillance systems in public and private environments due to a heightened sense of security. The next generation of surveill...
Arvind Kandhalu, Anthony Rowe, Ragunathan Rajkumar...
HOTOS
2003
IEEE
15 years 2 months ago
Flexible OS Support and Applications for Trusted Computing
Trusted computing (e.g. TCPA and Microsoft’s NextGeneration Secure Computing Base) has been one of the most talked about and least understood technologies in the computing commu...
Tal Garfinkel, Mendel Rosenblum, Dan Boneh
VTC
2007
IEEE
15 years 3 months ago
A NETwork COding based Multicasting (NETCOM) over IEEE 802.11 Multi-hop
— In this paper, we present an analysis of various multicast schemes over IEEE 802.11 Multi-hop. Analyzing performance of wireless multicasting communication is important because...
Yong Ho Kim, Nan Sol Seo, Young Yong Kim