Sciweavers

11217 search results - page 1802 / 2244
» Network Coding for Wireless Networks
Sort
View
ICDCSW
2008
IEEE
15 years 11 months ago
Pairing Devices with Good Quality Output Interfaces
The operation of achieving authenticated key agreement between two human-operated devices over a short range wireless communication channel, such as Bluetooth or WiFi, is known as...
Nitesh Saxena, Jonathan Voris
INFOCOM
2008
IEEE
15 years 11 months ago
An Empirical Activity Model for WLAN Users
Abstract—Understanding user behavior in wireless environments is useful for a variety of reasons ranging from the design of better sleep algorithms for components of mobile devic...
Caleb T. Phillips, Suresh Singh
113
Voted
ICC
2007
IEEE
111views Communications» more  ICC 2007»
15 years 11 months ago
Peer-to-Peer Vertical Mobility Management
— With the increasing number of wireless devices, the importance of mobility management in future mobile networks is growing. In addition, the number of access technologies avail...
Ramy Farha, Khashayar Khavari, Alberto Leon-Garcia
PERVASIVE
2007
Springer
15 years 10 months ago
Shake Well Before Use: Authentication Based on Accelerometer Data
Abstract. Small, mobile devices without user interfaces, such as Bluetooth headsets, often need to communicate securely over wireless networks. Active attacks can only be prevented...
Rene Mayrhofer, Hans Gellersen
140
Voted
INFOCOM
2005
IEEE
15 years 10 months ago
Bayesian indoor positioning systems
— In this paper, we introduce a new approach to location estimation where, instead of locating a single client, we simultaneously locate a set of wireless clients. We present a B...
David Madigan, E. Einahrawy, R. P. Martin, Wen-Hua...
« Prev « First page 1802 / 2244 Last » Next »