Sciweavers

508 search results - page 84 / 102
» Connectivity Model for Wireless Mesh Networks
Sort
View
EEE
2005
IEEE
15 years 7 months ago
Flexible Application Rights Management in a Pervasive Environment
The development and wider use of wireless networks and mobile devices has led to novel pervasive computing environments which pose new problems for software rights management and ...
Ivana Dusparic, Dominik Dahlem, Jim Dowling
CORR
2008
Springer
139views Education» more  CORR 2008»
15 years 2 months ago
The Secrecy Graph and Some of its Properties
A new random geometric graph model, the so-called secrecy graph, is introduced and studied. The graph represents a wireless network and includes only edges over which secure commun...
Martin Haenggi
89
Voted
HICSS
2002
IEEE
93views Biometrics» more  HICSS 2002»
15 years 6 months ago
High-Level Executable Specification of the Universal Plug and Play Architecture
Recently, Microsoft took a lead in the development of a standard for peer-to-peer network connectivity of various intelligent appliances, wireless devices and PCs. It is called th...
Uwe Glässer, Yuri Gurevich, Margus Veanes
147
Voted

Publication
232views
15 years 3 days ago
Measurement in 802.11 Wireless Networks and its Applications
Ease of deployment, wireless connectivity and ubiquitous mobile on-the-go computing has made the IEEE 802.11 the most widely deployed Wireless Local Area Network (WLAN) sta...
Malik Ahmad Yar Khan
SPW
2000
Springer
15 years 5 months ago
The Resurrecting Duckling - What Next?
In the context of the security of wireless ad hoc networks, we previously explored the problem of secure transient association between a master and a slave device in the absence of...
Frank Stajano