Sciweavers

10044 search results - page 99 / 2009
» Authentication in Wireless Networks
Sort
View
144
Voted
SIGCOMM
1997
ACM
15 years 7 months ago
Trace-Based Mobile Network Emulation
Subjecting a mobile computing system to wireless network conditions that are realistic yet reproducible is a challenging problem. In this paper, we describe a technique called tra...
Brian Noble, Mahadev Satyanarayanan, Giao Thanh Ng...
119
Voted
ADHOC
2007
104views more  ADHOC 2007»
15 years 3 months ago
Performance benchmarking of wireless Web servers
ct 8 The advent of mobile computers and wireless networks enables the deployment of wireless Web servers and clients in 9 short-lived ad hoc network environments, such as classroom...
Guangwei Bai, Kehinde Oladosu, Carey L. Williamson
121
Voted
WCE
2007
15 years 4 months ago
Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism
—In our paper, we are utilizing the cellular wireless network with high reliability using fixed relay nodes. The size and scope of wireless networks continue to grow with more cl...
V. Narasimha Raghavan, M. Venkatesh, Divya Sridhar...
118
Voted
COMCOM
2004
137views more  COMCOM 2004»
15 years 3 months ago
Security performance of loaded IEEE 802.11b wireless networks
Existing solutions for wireless LAN networks have been subject to security vulnerabilities and previous study has addressed and evaluated the security performance of IEEE 802.11b ...
Nilufar Baghaei, Ray Hunt
103
Voted
IPPS
2007
IEEE
15 years 10 months ago
ESSTCP: Enhanced Spread-Spectrum TCP
Having stealth and lightweight authentication methods is empowering network administrators to shelter critical services from adversaries. Spread-Spectrum TCP (SSTCP) [1] is one of...
Amir R. Khakpour, Hakima Chaouchi