Sciweavers

2200 search results - page 258 / 440
» Hop Integrity in Computer Networks
Sort
View
ICCS
2005
Springer
15 years 9 months ago
A Seamless Handover Mechanism for IEEE 802.16e Broadband Wireless Access
Abstract. Handover is one of the most important factors that may degrade the performance of TCP connections and real-time applications in wireless data networks. We developed a los...
Kyung-ah Kim, Chong-kwon Kim, Tongsok Kim
POLICY
2004
Springer
15 years 9 months ago
PROTON: A Policy-based Solution for Future 4G devices
We present PROTON, a policy-based solution for 4G mobile devices – it allows users to seamlessly connect to highly integrated heterogeneous wireless networks. The key motivation...
Pablo Vidales, Rajiv Chakravorty, Calicrates Polic...
FGCS
2000
131views more  FGCS 2000»
15 years 3 months ago
Keystroke dynamics as a biometric for authentication
More than ever before the Internet is changing computing as we know it. Global access to information and resources is becoming an integral part of nearly every aspect of our lives...
Fabian Monrose, Aviel D. Rubin
PERCOM
2007
ACM
16 years 3 months ago
SMOCK: A Self-Contained Public Key Management Scheme for Mission-Critical Wireless Ad Hoc Networks
Mobile ad hoc networks show great potential in emergency response and/or recovery. Such mission-critical applications demand security service be "anywhere", "anytim...
Wenbo He, Ying Huang, Klara Nahrstedt, Whay Chiou ...
BIOINFORMATICS
2002
146views more  BIOINFORMATICS 2002»
15 years 3 months ago
A duplication growth model of gene expression networks
Motivation: There has been considerable interest in developing computational techniques for inferring genetic regulatory networks from whole-genome expression profiles. When expre...
Ashish Bhan, David J. Galas, T. Gregory Dewey