Sciweavers

5699 search results - page 1028 / 1140
» Applications of Wireless Sensor Networks
Sort
View
IPPS
2007
IEEE
15 years 4 months ago
Transaction Based Authentication Scheme for Mobile Communication: A Cognitive Agent Based Approach
The vulnerable air interface, device level constraints, and insecure encryption techniques of wireless networks have naturally increased the chance of attacker obtaining users inf...
B. Sathish Babu, Pallapa Venkataram
IPPS
2006
IEEE
15 years 4 months ago
Performance evaluation of an enhanced distributed channel access protocol under heterogeneous traffic
Recently there have been considerable interests focusing on the performance evaluation of IEEE 802.11e Medium Access Control (MAC) protocols, which were proposed for supporting Qu...
Mamun I. Abu-Tair, Geyong Min
FTDCS
2004
IEEE
15 years 1 months ago
A Distributed Buffer Management Approach Supporting IPv6 Mobility
In wireless local area networks (WLANs), mobility support is essential for providing seamless services. The current Mobile IP standard suffers several problems, especially for acc...
Yu-Hung Liu, Yaw-Chung Chen
INFOCOM
2011
IEEE
14 years 1 months ago
Feasibility and optimization of delay guarantees for non-homogeneous flows in IEEE 802.11 WLANs
—Due to the rapid growth of real-time applications and the ubiquity of IEEE 802.11 MAC as a layer-2 protocol for wireless local area networks (WLANs), it is of increasing interes...
Yan Gao, Chee Wei Tan, Ying Huang, Zheng Zeng, P. ...
IDMS
1997
Springer
188views Multimedia» more  IDMS 1997»
15 years 1 months ago
An Approach for an Adaptive Visualization in a Mobile Environment
With the evolving availability of wireless communication servicesand of affordable mobile devices such as notebooks or Personal Digital Assistants, mobile computing is becoming wid...
Luc Neumann, Alberto Barbosa Raposo
« Prev « First page 1028 / 1140 Last » Next »