Sciweavers

10044 search results - page 211 / 2009
» Authentication in Wireless Networks
Sort
View
COMCOM
2008
244views more  COMCOM 2008»
15 years 4 months ago
Energy analysis of routing protocols for underwater wireless sensor networks
Underwater wireless sensor networks consist of a certain number of sensors and vehicles that interact to collect data and perform collaborative tasks. Designing energy-efficient r...
Mari Carmen Domingo, Rui Prior
151
Voted
ICC
2007
IEEE
212views Communications» more  ICC 2007»
15 years 10 months ago
Middleware Vertical Handoff Manager: A Neural Network-Based Solution
— – Major research challenges in the next generation of wireless networks include the provisioning of worldwide seamless mobility across heterogeneous wireless networks, the im...
Nidal Nasser, Sghaier Guizani, Eyhab Al-Masri
NCA
2006
IEEE
15 years 10 months ago
A System for Secure IP Telephone Conferences
We present a system for secure telephone conferences (stc) over the internet. The system ensures participant authentication via x.509 certificates, such that every participant of...
Axel Treßel, Jorg Keller
MEDES
2010
ACM
14 years 11 months ago
UBI-hotspots: sustainable ecosystem infrastructure for real world urban computing research and business
We report a novel deployment of so-called UBI-hotspots in a city center to establish an ecosystem infrastructure for conducting diverse urban computing research and business in au...
Timo Ojala, V. Valkama, Hannu Kukka, Tommi Heikkin...
INFOCOM
2003
IEEE
15 years 9 months ago
EMPOWER: A Network Emulator for Wireless and Wireline Networks
— The increasing need of protocol development environments and network performance evaluation tools gives rise to the research of flexible, scalable, and accurate network emulato...
Pei Zheng, Lionel M. Ni