Sciweavers

10044 search results - page 125 / 2009
» Authentication in Wireless Networks
Sort
View
IJCOMSYS
2006
111views more  IJCOMSYS 2006»
14 years 11 months ago
Layered view of QoS issues in IP-based mobile wireless networks
With the convergence of wireless communication and IP-based networking technologies, future IP-based wireless networks are expected to support real-time multimedia. IP services ov...
Haowei Bai, Mohammed Atiquzzaman, David J. Lilja
BROADCOM
2008
IEEE
15 years 1 months ago
Improving Video Streaming over IEEE 802.11 Mesh Networks through a Cross-Layer Design Technique
There has been a spate of interest in wireless mesh networks in recent years. The reason behind such an upsurge of interest is that wireless mesh networks are seen as enablers of u...
N. H. Moleme, M. O. Odhiambo, Anish M. Kurien
SIGCSE
1999
ACM
97views Education» more  SIGCSE 1999»
15 years 3 months ago
Education of wireless and ATM networking concepts using hands-on laboratory experience
Abstract Traditional computer networking courses primarily tend to provide students with hands-on software development and network performance experience with TCP/IP and Ethernet n...
Krishna M. Sivalingam, V. Rajaravivarma
DSOM
2003
Springer
15 years 4 months ago
Idiosyncratic Signatures for Authenticated Execution of Management Code
TrustedFlow™ is a software solution to the problem of remotely authenticating code during execution. A continuous flow of idiosyncratic signatures assures that the software from ...
Mario Baldi, Yoram Ofek, Moti Yung
SAGA
2007
Springer
15 years 5 months ago
Randomized Algorithms and Probabilistic Analysis in Wireless Networking
Abstract. Devices connected wirelessly, in various forms including computers, hand-held devices, ad hoc networks, and embedded systems, are expected to become ubiquitous all around...
Aravind Srinivasan