Sciweavers

840 search results - page 148 / 168
» Real-time service provisioning for mobile and wireless netwo...
Sort
View
QSHINE
2005
IEEE
15 years 3 months ago
Cooperative-Diversity Slotted ALOHA
We propose a cooperative-diversity technique for ad hoc networks based on the decode-and-forward relaying strategy. We develop a MAC protocol based on slotted ALOHA that allows ne...
Wing-Hin Wong, John M. Shea, Tan F. Wong
70
Voted
WIMOB
2008
IEEE
15 years 4 months ago
An Enhanced Scheme to Defend against False-Endorsement-Based DoS Attacks in WSNs
— Node compromise is a serious threat in wireless sensor networks, as it enables an adversary to perform various attacks. Many security schemes exploit the redundancy of many wir...
Christoph Krauß, Markus Schneider, Claudia E...
FIW
2003
120views Communications» more  FIW 2003»
14 years 11 months ago
A Policy Architecture for Enhancing and Controlling Features
Abstract. Features provide extensions to a basic service, but in new systems users require much greater flexibility oriented towards their needs. Traditional features do not easil...
Stephan Reiff-Marganiec, Kenneth J. Turner
CCS
2009
ACM
15 years 1 months ago
On lightweight mobile phone application certification
Users have begun downloading an increasingly large number of mobile phone applications in response to advancements in handsets and wireless networks. The increased number of appli...
William Enck, Machigar Ongtang, Patrick Drew McDan...
PERCOM
2006
ACM
15 years 9 months ago
Inverted Browser: A Novel Approach towards Display Symbiosis
In this paper we introduce the Inverted Browser, a novel approach to enable mobile users to view content from their personal devices on public displays. The Inverted Browser is a ...
Mandayam T. Raghunath, Nishkam Ravi, Marcel-Catali...