Sciweavers

1423 search results - page 102 / 285
» Ordering in Mobile Networks Using Integrated Sequencers
Sort
View
GLOBECOM
2009
IEEE
15 years 7 months ago
Detecting Identity Spoofs in IEEE 802.11e Wireless Networks
Abstract--Wireless networks are vulnerable to identity spoofing attacks, where an attacker can forge the MAC address of his wireless device to assume the identity of another victim...
Gayathri Chandrasekaran, John-Austen Francisco, Vi...
ECCV
2010
Springer
15 years 8 months ago
Multi-Person Tracking with Sparse Detection and Continuous Segmentation
This paper presents an integrated framework for mobile street-level tracking of multiple persons. In contrast to classic tracking-by-detection approaches, our framework employs an ...
AINA
2008
IEEE
15 years 10 months ago
XOP: Sharing XML Data Objects through Peer-to-Peer Networks
This paper describes an architecture for sharing data in XML format through a peer-to-peer (P2P) network, which interconnects devices ranging from high-end servers to mobile devic...
Itamar de Rezende, Frank Siqueira
EJWCN
2010
119views more  EJWCN 2010»
14 years 10 months ago
Simulations of the Impact of Controlled Mobility for Routing Protocols
This paper addresses mobility control routing in wireless networks. Given a data flow request between a sourcedestination pair, the problem is to move nodes towards the best placem...
Valeria Loscrì, Enrico Natalizio, Carmelo C...
IMECS
2007
15 years 5 months ago
Approaches to an Adaptive Middleware for Mobile Services
Abstract—Adaptive middleware and wireless networks are hot topics in many discussions today. Literature describes a lot of approaches which are based upon existing middleware tec...
Ulrich Dümichen, Uwe Baumgarten