Sciweavers

909 search results - page 138 / 182
» Autonomic control and personalization of a wireless access n...
Sort
View
SAINT
2005
IEEE
15 years 3 months ago
A Context-centric Security Middleware for Service Provisioning in Pervasive Computing
Pervasive user mobility, wireless connectivity and the widespread diffusion of portable devices raise new challenges for ubiquitous service provisioning. An emerging architecture ...
Antonio Corradi, Rebecca Montanari, Daniela Tibald...
VTC
2006
IEEE
101views Communications» more  VTC 2006»
15 years 3 months ago
Coexistence and Interworking of IEEE 802.16 and IEEE 802.11(e)
— The coexistence and interworking of IEEE 802.16 and IEEE 802.11 is an acute problem. The frame-based medium access of 802.16 requires rigorous protection against interference f...
Lars Berlemann, Christian Hoymann, Guido R. Hiertz...
MSWIM
2005
ACM
15 years 3 months ago
Adapting WLAN MAC parameters to enhance VoIP call capacity
This work describes a detailed simulation-based study of the performance of an IEEE 802.11e Medium Access Control (MAC) layer over an IEEE 802.11g Physical (PHY) layer. The study ...
Gráinne Hanley, Seán Murphy, Liam Mu...
HICSS
2012
IEEE
260views Biometrics» more  HICSS 2012»
13 years 5 months ago
Do Me a Solid? Information Asymmetry, Liking, and Compliance Gaining Online
As the popularity of interactive social media grows, it is increasingly normal for individuals to reveal significant amounts of personal information online. Although this informat...
Nathan J. Claes, Carolyn Hurley, Michael A. Stefan...
SOUPS
2009
ACM
15 years 4 months ago
Social applications: exploring a more secure framework
Online social network sites, such as MySpace, Facebook and others have grown rapidly, with hundreds of millions of active users. A new feature on many sites is social applications...
Andrew Besmer, Heather Richter Lipford, Mohamed Sh...