Sciweavers

1806 search results - page 310 / 362
» Autonomous Network Equipments
Sort
View
IMC
2007
ACM
15 years 6 months ago
Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs
Rogue (unauthorized) wireless access points pose serious security threats to local networks. In this paper, we propose two online algorithms to detect rogue access points using se...
Wei Wei, Kyoungwon Suh, Bing Wang, Yu Gu, Jim Kuro...
144
Voted
MOBICOM
2010
ACM
15 years 4 months ago
Privacy vulnerability of published anonymous mobility traces
Mobility traces of people and vehicles have been collected and published to assist the design and evaluation of mobile networks, such as large-scale urban sensing networks. Althou...
Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip, Na...
CORR
2010
Springer
133views Education» more  CORR 2010»
15 years 4 months ago
PSIM: A tool for analysis of device pairing methods
Wireless networks are a common place nowadays and almost all of the modern devices support wireless communication in some form. These networks differ from more traditional computi...
Yasir Arfat Malkani, Lachhman Das Dhomeja
MTA
2008
132views more  MTA 2008»
15 years 4 months ago
Peer to peer video streaming in Bluetooth overlays
As Bluetooth is available in most personal and portable terminals (eg, cellular phone, PDA, videocamera, laptop, etc) P2P video streaming through Bluetooth networks is now a reali...
Sewook Jung, Alexander Chang, Mario Gerla
TMC
2008
114views more  TMC 2008»
15 years 4 months ago
SIP Multicast-Based Mobile Quality-of-Service Support over Heterogeneous IP Multimedia Subsystems
The Universal Mobile Telecommunications System (UMTS) all-IP network supports IP multimedia services through the IP Multimedia Subsystem (IMS). This paper proposes a mobile Qualit...
Shun-Ren Yang, Wen-Tsuen Chen