Sciweavers

5068 search results - page 760 / 1014
» Basic Computations in Wireless Networks
Sort
View
DCOSS
2011
Springer
14 years 4 months ago
Link quality ranking: Getting the best out of unreliable links
—Link quality estimation has been an active area of research within the wireless sensor network community. It is now well known that the estimation of reliable links requires few...
Marco Zuniga, Izabela Irzynska, Jan-Hinrich Hauer,...
140
Voted
WOWMOM
2009
ACM
124views Multimedia» more  WOWMOM 2009»
15 years 11 months ago
VAPS: Positioning with spatial constraints
The proliferation of mobile computing devices and local wireless networks has promoted a growing interest in location-aware systems. The problem with existing positioning techniqu...
Yesid Jarma, Golnaz Karbaschi, Marcelo Dias de Amo...
IPPS
2007
IEEE
15 years 11 months ago
Transaction Based Authentication Scheme for Mobile Communication: A Cognitive Agent Based Approach
The vulnerable air interface, device level constraints, and insecure encryption techniques of wireless networks have naturally increased the chance of attacker obtaining users inf...
B. Sathish Babu, Pallapa Venkataram
127
Voted
HUC
2009
Springer
15 years 9 months ago
A Long-Duration Study of User-Trained 802.11 Localization
We present an indoor wireless localization system that is capable of room-level localization based solely on 802.11 network signal strengths and usersupplied training data. Our sys...
Andrew Barry, Benjamin Fisher, Mark L. Chang
IPPS
2006
IEEE
15 years 11 months ago
Performance evaluation of an enhanced distributed channel access protocol under heterogeneous traffic
Recently there have been considerable interests focusing on the performance evaluation of IEEE 802.11e Medium Access Control (MAC) protocols, which were proposed for supporting Qu...
Mamun I. Abu-Tair, Geyong Min