Sciweavers

106 search results - page 16 / 22
» Incentive Engineering in Wireless LAN Based Access Networks
Sort
View
89
Voted
PERCOM
2005
ACM
15 years 9 months ago
Exploiting Information Relationships for Access Control
Pervasive computing environments offer a multitude of information services that provide potentially complex types of information. Therefore, when running access control for sensit...
Urs Hengartner, Peter Steenkiste
RAID
2005
Springer
15 years 2 months ago
Sequence Number-Based MAC Address Spoof Detection
Abstract. The exponential growth in the deployment of IEEE 802.11based wireless LAN (WLAN) in enterprises and homes makes WLAN an attractive target for attackers. Attacks that expl...
Fanglu Guo, Tzi-cker Chiueh
IPSN
2010
Springer
15 years 4 months ago
User-centric radio power control for opportunistic mountain hiking networks
bstract: User-Centric Radio Power Control for Opportunistic Mountain Hiking Networks ∗ Jyh-How Huang1 , Po-Yen Lin1 , Yu-Te Huang2 , Seng-Yong Lau1 , Ling-Jyh Chen2 , Kun-chan La...
Jyh-How Huang, Po-Yen Lin, Yu-Te Huang, Seng-Yong ...
ICC
2007
IEEE
153views Communications» more  ICC 2007»
15 years 3 months ago
An End-to-End Technique to Estimate the Transmission Rate of an IEEE 802.11 WLAN
— The deployment of wireless LANs (WLANs) has been steadily increasing over the years and estimating the actual bit rate of a WLAN device is important for management and applicat...
Antonio Augusto de Aragão Rocha, Rosa Maria...
ISCC
2005
IEEE
179views Communications» more  ISCC 2005»
15 years 3 months ago
Micro Mobile MPLS: A New Scheme for Micro-mobility Management in 3G All-IP Networks
This article presents the Micro Mobile MPLS scheme, which is a new proposal for IP local mobility in wireless MPLS access networks. Our proposal is based on multiprotocol label sw...
Rami Langar, Samir Tohmé, Gwendal Le Grand