Sciweavers

10044 search results - page 1933 / 2009
» Authentication in Wireless Networks
Sort
View
HPCC
2007
Springer
15 years 10 months ago
A Data Imputation Model in Sensor Databases
Data missing is a common problem in database query processing, which can cause bias or lead to inefficient analyses, and this problem happens more often in sensor databases. The re...
Nan Jiang
ICOIN
2007
Springer
15 years 10 months ago
Inter-Domain Access Volume Model: Ranking Autonomous Systems
Exploring topological structure at Autonomous System (AS) level is indispensable for understanding most issues in Internet services. Previous models of AS graph involve address or ...
Yixuan Wang, Ye Wang, Maoke Chen, Xing Li
IFIP
2007
Springer
15 years 10 months ago
Enhancing IEEE 802.11n WLANs using group-orthogonal code-division multiplex
The definition of the next generation of wireless networks is well under way within the IEEE 802.11 High Throughput Task Group committee. The resulting standard, to be called IEEE...
Guillem Femenias, Felip Riera-Palou
OTM
2007
Springer
15 years 10 months ago
A Bluetooth-Based JXME Infrastructure
Abstract. Over the last years, research efforts have led the way to embed computation into the environment. Much attention is drawn to technologies supporting dynamicity and mobil...
Carlo Blundo, Emiliano De Cristofaro
DASC
2006
IEEE
15 years 10 months ago
DRBTS: Distributed Reputation-based Beacon Trust System
Abstract— Wireless Sensor Networks (WSNs) have critical applications in diverse domains like environmental monitoring and military operations where accurate location of sensors i...
Avinash Srinivasan, Joshua Teitelbaum, Jie Wu
« Prev « First page 1933 / 2009 Last » Next »