Rogue (unauthorized) wireless access points pose serious security threats to local networks. In this paper, we propose two online algorithms to detect rogue access points using se...
Wei Wei, Kyoungwon Suh, Bing Wang, Yu Gu, Jim Kuro...
Mobility traces of people and vehicles have been collected and published to assist the design and evaluation of mobile networks, such as large-scale urban sensing networks. Althou...
Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip, Na...
Wireless networks are a common place nowadays and almost all of the modern devices support wireless communication in some form. These networks differ from more traditional computi...
As Bluetooth is available in most personal and portable terminals (eg, cellular phone, PDA, videocamera, laptop, etc) P2P video streaming through Bluetooth networks is now a reali...
The Universal Mobile Telecommunications System (UMTS) all-IP network supports IP multimedia services through the IP Multimedia Subsystem (IMS). This paper proposes a mobile Qualit...