Sciweavers

2268 search results - page 402 / 454
» Modeling wireless shadow networks
Sort
View
CCS
2001
ACM
15 years 9 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
INFOCOM
2008
IEEE
15 years 11 months ago
Competitive Analysis of Opportunistic Spectrum Access Strategies
—We consider opportunistic spectrum access (OSA) strategies for a transmitter in a multichannel wireless system, where a channel may or may not be available and the transmitter m...
Nicholas B. Chang, Mingyan Liu
HICSS
2009
IEEE
126views Biometrics» more  HICSS 2009»
15 years 8 months ago
Specifying and Analyzing Workflows for Automated Identification and Data Capture
Humans use computers to carry out tasks that neither is able to do easily alone: humans provide eyes, hands, and judgment while computers provide computation, networking, and stor...
Elsa L. Gunter, Ayesha Yasmeen, Carl A. Gunter, An...
ICC
2008
IEEE
102views Communications» more  ICC 2008»
15 years 11 months ago
Reliable Routing for Roadside to Vehicle Communications in Rural Areas
—The demands for vehicular Internet access are proliferating. Access Points (APs) can be deployed along the roadside to provide wireless coverage and network access for mobile ve...
Shen Wan, Jian Tang, Richard S. Wolff
ICC
2008
IEEE
106views Communications» more  ICC 2008»
15 years 11 months ago
Performance Evaluation of BICM-OFDM Systems Impaired by UWB Interference
— In this paper, we propose a theoretical framework for the analysis of the impact of ultra–wideband (UWB) interference on systems that use the popular combination of bit– in...
Amir Nasri, Robert Schober, Lutz H.-J. Lampe