Sciweavers

6122 search results - page 1060 / 1225
» Securing network access in wireless sensor networks
Sort
View
JSAC
2007
153views more  JSAC 2007»
14 years 10 months ago
Cooperative Relay Service in a Wireless LAN
As a family of wireless local area network (WLAN) protocols between physical layer and higher layer protocols, IEEE 802.11 has to accommodate the features and requirements of both...
Lei Guo, Xiaoning Ding, Haining Wang, Qun Li, Song...
SACMAT
2003
ACM
15 years 3 months ago
The role control center: features and case studies
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of pr...
David F. Ferraiolo, Ramaswamy Chandramouli, Gail-J...
ICDCS
2008
IEEE
15 years 4 months ago
Quality of Trilateration: Confidence Based Iterative Localization
—The proliferation of wireless and mobile devices has fostered the demand for context-aware applications, in which location is one of the most significant contexts. Multilaterati...
Zheng Yang, Yunhao Liu
DATE
2010
IEEE
148views Hardware» more  DATE 2010»
15 years 2 months ago
Scoped identifiers for efficient bit aligned logging
Abstract--Detailed diagnostic data is a prerequisite for debugging problems and understanding runtime performance in distributed wireless embedded systems. Severe bandwidth limitat...
Roy Shea, Mani B. Srivastava, Young Cho
78
Voted
TPDS
2010
86views more  TPDS 2010»
14 years 8 months ago
Quality of Trilateration: Confidence-Based Iterative Localization
The proliferation of wireless and mobile devices has fostered the demand of context aware applications. Location is one of the most significant contexts. Multilateration, as a bas...
Zheng Yang, Yunhao Liu
« Prev « First page 1060 / 1225 Last » Next »