Sciweavers

1030 search results - page 153 / 206
» Protocols Using Anonymous Connections: Mobile Applications
Sort
View
IWCMC
2006
ACM
15 years 3 months ago
A heuristics based approach for cellular mobile network planning
Designing and planning of the switching, signaling and support network is a fairly complex process in cellular mobile network. In this paper, the problem of assigning cells to swi...
Marwan H. Abu-Amara, Sadiq M. Sait, Abdul Subhan
MOBICOM
2004
ACM
15 years 3 months ago
MobiDesk: mobile virtual desktop computing
We present MobiDesk, a mobile virtual desktop computing hosting infrastructure that leverages continued improvements in network speed, cost, and ubiquity to address the complexity...
Ricardo A. Baratto, Shaya Potter, Gong Su, Jason N...
VTC
2007
IEEE
105views Communications» more  VTC 2007»
15 years 4 months ago
Performance of IEEE 802.11a in Vehicular Contexts
— A key component of intelligent transportation is the provision of adequate network infrastructure to support vehicleto-vehicle and vehicle-to-roadside communication. In this pa...
David N. Cottingham, Ian J. Wassell, Robert K. Har...
DFN
2004
14 years 11 months ago
SIP Security
: Ubiquitous worldwide broadband Internet access as well the coming of age of VoIP technology have made Voice-over-IP an increasingly attractive and useful network application. Cur...
Andreas Steffen, Daniel Kaufmann, Andreas Stricker
ADHOC
2006
184views more  ADHOC 2006»
14 years 9 months ago
Wireless underground sensor networks: Research challenges
This work introduces the concept of a Wireless Underground Sensor Network (WUSN). WUSNs can be used to monitor a variety of conditions, such as soil properties for agricultural ap...
Ian F. Akyildiz, Erich P. Stuntebeck