Sciweavers

1306 search results - page 235 / 262
» Localizing Jammers in Wireless Networks
Sort
View
143
Voted
IJNSEC
2006
200views more  IJNSEC 2006»
15 years 4 months ago
3G and WLAN Interworking Security: Current Status and Key
The third-generation (3G) mobile communication systems provide great coverage, complete subscriber management and nearly universal roaming. Nevertheless, 3G systems are subject to...
Chou Chen Yang, Kuan-Hao Chu, Ya-Wen Yang
JSAC
2007
180views more  JSAC 2007»
15 years 4 months ago
A Cross-Layer Approach for WLAN Voice Capacity Planning
— This paper presents an analytical approach to determining the maximum number of on/off voice flows that can be supported over a wireless local area network (WLAN), under a qua...
Yu Cheng, Xinhua Ling, Wei Song, Lin X. Cai, Weihu...
MOBISYS
2007
ACM
16 years 3 months ago
Rendezvous-based access control for medical records in the pre-hospital environment
We present rendezvous-based access control for access control in the pre-hospital environment. Rendezvous-based access control is a simple cryptographic access control method that...
Feike W. Dillema, Simone Lupetti
CCGRID
2011
IEEE
14 years 8 months ago
GeoServ: A Distributed Urban Sensing Platform
—Urban sensing where mobile users continuously gather, process, and share location-sensitive sensor data (e.g., street images, road condition, traffic flow) is emerging as a ne...
Jong Hoon Ahnn, Uichin Lee, Hyun Jin Moon
ICDE
2007
IEEE
144views Database» more  ICDE 2007»
15 years 10 months ago
Greedy Cache Management Techniques for Mobile Devices
Mobile devices are configured with one or more wireless cards that provide limited radio-range and unreliable transmission. These energy-constrained devices are configured with ...
Shahram Ghandeharizadeh, Shahin Shayandeh