Sciweavers

10044 search results - page 99 / 2009
» Authentication in Wireless Networks
Sort
View
SIGCOMM
1997
ACM
15 years 3 months ago
Trace-Based Mobile Network Emulation
Subjecting a mobile computing system to wireless network conditions that are realistic yet reproducible is a challenging problem. In this paper, we describe a technique called tra...
Brian Noble, Mahadev Satyanarayanan, Giao Thanh Ng...
ADHOC
2007
104views more  ADHOC 2007»
14 years 11 months ago
Performance benchmarking of wireless Web servers
ct 8 The advent of mobile computers and wireless networks enables the deployment of wireless Web servers and clients in 9 short-lived ad hoc network environments, such as classroom...
Guangwei Bai, Kehinde Oladosu, Carey L. Williamson
WCE
2007
15 years 13 days ago
Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism
—In our paper, we are utilizing the cellular wireless network with high reliability using fixed relay nodes. The size and scope of wireless networks continue to grow with more cl...
V. Narasimha Raghavan, M. Venkatesh, Divya Sridhar...
COMCOM
2004
137views more  COMCOM 2004»
14 years 11 months ago
Security performance of loaded IEEE 802.11b wireless networks
Existing solutions for wireless LAN networks have been subject to security vulnerabilities and previous study has addressed and evaluated the security performance of IEEE 802.11b ...
Nilufar Baghaei, Ray Hunt
IPPS
2007
IEEE
15 years 5 months ago
ESSTCP: Enhanced Spread-Spectrum TCP
Having stealth and lightweight authentication methods is empowering network administrators to shelter critical services from adversaries. Spread-Spectrum TCP (SSTCP) [1] is one of...
Amir R. Khakpour, Hakima Chaouchi