Sciweavers

10044 search results - page 1984 / 2009
» Authentication in Wireless Networks
Sort
View
PERVASIVE
2010
Springer
14 years 11 months ago
Supporting Energy-Efficient Uploading Strategies for Continuous Sensing Applications on Mobile Phones
Abstract. Continuous sensing applications (e.g., mobile social networking applications) are appearing on new sensor-enabled mobile phones such as the Apple iPhone, Nokia and Androi...
Mirco Musolesi, Mattia Piraccini, Kristof Fodor, A...
AVI
2006
14 years 11 months ago
Mobility agents: guiding and tracking public transportation users
Increasingly, public transportation systems are equipped with Global Positioning Systems (GPS) connected to control centers through wireless networks. Controllers use this infrast...
Alexander Repenning, Andri Ioannidou
CSREASAM
2006
14 years 11 months ago
Framework for realizing Mobile and Computer Communications through Color Signals
: This paper proposes a technology for realizing a mobile network based on color signals which does not require the time and the space switching matrix for call routing. In absence...
Rajarshi Sanyal
SIGCOMM
2010
ACM
14 years 9 months ago
Contrabass: concurrent transmissions without coordination
A PHY and MAC protocol for MIMO concurrent transmissions, called Contrabass, is presented. Concurrent transmissions, also referred to as multi-user MIMO, are simultaneous transmis...
Sungro Yoon
ADHOC
2007
122views more  ADHOC 2007»
14 years 9 months ago
Modeling and analyzing the correctness of geographic face routing under realistic conditions
Geographic protocols are very promising for wireless ad hoc and sensor networks due to the low state storage and low message overhead. Under certain idealized conditions, geograph...
Karim Seada, Ahmed Helmy, Ramesh Govindan
« Prev « First page 1984 / 2009 Last » Next »