Sciweavers

10044 search results - page 1952 / 2009
» Authentication in Wireless Networks
Sort
View
71
Voted
CORR
2008
Springer
159views Education» more  CORR 2008»
14 years 11 months ago
Compound Multiple Access Channels with Partial Cooperation
A two-user discrete memoryless compound multiple access channel with a common message and conferencing decoders is considered. The capacity region is characterized in the special ...
Osvaldo Simeone, Deniz Gündüz, H. Vincen...
CN
2006
98views more  CN 2006»
14 years 11 months ago
A performance analysis of context transfer protocols for QoS enabled internet services
In nowadays wireless networks, mobile users frequently access Internet services that are often based on information concerning the application context and service status. In prese...
Novella Bartolini, Emiliano Casalicchio
COMPSEC
2006
97views more  COMPSEC 2006»
14 years 11 months ago
Towards a location-based mandatory access control model
With the growing use of wireless networks and mobile devices, we are moving towards an era where location information will be necessary for access control. The use of location inf...
Indrakshi Ray, Mahendra Kumar
CCR
2007
108views more  CCR 2007»
14 years 11 months ago
Very low-cost internet access using KioskNet
Rural Internet kiosks in developing regions can cost-effectively provide communication and e-governance services to the poorest sections of society. A variety of technical and no...
Shimin Guo, Mohammad Hossein Falaki, Earl A. Olive...
IJSNET
2008
115views more  IJSNET 2008»
14 years 11 months ago
Event-driven sensor deployment using self-organizing maps
: Coverage is an important optimization objective in pre and post-deployment stage of a Wireless Sensor Network (WSN). In this paper, we address the issue of placing a finite set o...
Cris Koutsougeras, Yi Liu, Rong Zheng
« Prev « First page 1952 / 2009 Last » Next »