Sciweavers

10044 search results - page 190 / 2009
» Authentication in Wireless Networks
Sort
View
120
Voted
MOBIHOC
2006
ACM
15 years 10 months ago
Deploying wireless sensors to achieve both coverage and connectivity
Xiaole Bai, Santosh Kumar, Dong Xuan, Ziqiu Yun, T...
HUMAN
2003
Springer
15 years 9 months ago
Analysis of User Utility Function in the Combined Cellular/WLAN Environments
Recent advances in wireless networking technologies enabled nomadic users connected to the Internet anywhere from the outdoor environments such as airport, hotel, subway station, o...
Jae-Hwan Kim, Young Yong Kim
213
Voted
WS
2003
ACM
15 years 9 months ago
Wireless LAN location-sensing for security applications
This paper considers the problem of using wireless LAN locationsensing for security applications. Recently, Bayesian methods have been successfully used to determine location from...
Ping Tao, Algis Rudys, Andrew M. Ladd, Dan S. Wall...
SECON
2010
IEEE
15 years 2 months ago
Deconstructing Interference Relations in WiFi Networks
Abstract--Wireless interference is the major cause of degradation of capacity in 802.11 wireless networks. We present an approach to estimate the interference between nodes and lin...
Anand Kashyap, Utpal Paul, Samir R. Das
WOWMOM
2000
ACM
86views Multimedia» more  WOWMOM 2000»
15 years 8 months ago
Real-time prioritized call admission control in a base station scheduler
With the deployment of packetized wireless networks, the need for Quality of Service is becoming increasingly important. In order for QoS to be implemented and e ciently supported...
Jay R. Moorman, John W. Lockwood, Sung-Mo Kang