Sciweavers

638 search results - page 62 / 128
» Mobility Management Using P2P Techniques in Wireless Network...
Sort
View
PERCOM
2004
ACM
15 years 9 months ago
On Negotiating Automatic Device Configuration in Smart Environments
As the number of mobile devices we carry grows, the job of managing those devices throughout the day becomes cumbersome. In addition, the ability to use mobile devices in unethica...
Kay Connelly, Ashraf Khalil
ACSAC
2004
IEEE
15 years 1 months ago
An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks
Mobile ad hoc network routing protocols are highly susceptible to subversion. Previous research in securing these protocols has typically used techniques based on encryption and r...
Giovanni Vigna, Sumit Gwalani, Kavitha Srinivasan,...
EURONGI
2005
Springer
15 years 3 months ago
An Afterstates Reinforcement Learning Approach to Optimize Admission Control in Mobile Cellular Networks
We deploy a novel Reinforcement Learning optimization technique based on afterstates learning to determine the gain that can be achieved by incorporating movement prediction inform...
José Manuel Giménez-Guzmán, J...
MSWIM
2005
ACM
15 years 3 months ago
YAES: a modular simulator for mobile networks
Developing network protocols for mobile wireless systems is a complex task, and most of the existing simulator frameworks are not well suited for experimental development. The YAE...
Ladislau Bölöni, Damla Turgut
TMC
2008
112views more  TMC 2008»
14 years 9 months ago
Location-Based Spatial Query Processing in Wireless Broadcast Environments
Location-based spatial queries (LBSQs) refer to spatial queries whose answers rely on the location of the inquirer. Efficient processing of LBSQs is of critical importance with the...
Wei-Shinn Ku, Roger Zimmermann, Haixun Wang