Sciweavers

10044 search results - page 1950 / 2009
» Authentication in Wireless Networks
Sort
View
98
Voted
USENIX
1994
15 years 13 days ago
Secure Short-Cut Routing for Mobile IP
This paper describes the architecture and implementation of a mobile IP system. It allows mobile hosts to roam between cells implemented with 2-Mbps radio base stations, while mai...
Trevor Blackwell, Kee Chan, Koling Chang, Thomas C...
WCE
2007
15 years 9 days ago
QoS-aware Multicast Ad hoc On-Demand Distance Vector Routing
—Ad hoc networking will become a major technology for wireless connectivity beside the multimedia necessity within the next few years. There are too many applications where one-t...
Vida Lashkari B. O., Mehdi Dehghan
EUROPAR
2010
Springer
15 years 7 days ago
Collaborative Cellular-Based Location System
Abstract. A large number of techniques for location estimation relying on the existing wireless radio infrastructures have been proposed in the last few years. Solutions relying on...
David Navalho, Nuno M. Preguiça
GISCIENCE
2010
Springer
212views GIS» more  GISCIENCE 2010»
15 years 7 days ago
Qualitative Change to 3-Valued Regions
Regions which evolve over time are a significant aspect of many phenomena in geographic information science. Examples include areas in which a measured value (e.g. temperature, sal...
Matt Duckham, John G. Stell, Maria Vasardani, Mich...
DAIS
2009
15 years 7 days ago
Fault-Tolerant Aggregation by Flow Updating
Data aggregation plays an important role in the design of scalable systems, allowing the determination of meaningful system-wide properties to direct the execution of distributed a...
Paulo Jesus, Carlos Baquero, Paulo Sérgio A...
« Prev « First page 1950 / 2009 Last » Next »