Sciweavers

6122 search results - page 1065 / 1225
» Securing network access in wireless sensor networks
Sort
View
82
Voted
WINET
2010
97views more  WINET 2010»
14 years 8 months ago
Routing in the frequency domain
Abstract The design of single transceiver based multichannel multi-hop wireless mesh networks focuses on the trade-off between rapid neighbor synchronization and maximizing the usa...
Jay A. Patel, Haiyun Luo, Indranil Gupta
WMASH
2003
ACM
15 years 3 months ago
MobileNAT: a new technique for mobility across heterogeneous address spaces
We propose a new network layer mobility architecture called MOBILENAT to efficiently support micro and macro-mobility in and across heterogeneous address spaces common in emergin...
Milind M. Buddhikot, Adiseshu Hari, Kundan Singh, ...
101
Voted
DBSEC
2007
112views Database» more  DBSEC 2007»
14 years 11 months ago
Reliable Delivery of Event Data from Sensors to Actuators in Pervasive Computing Environments
Abstract. The event-condition-action (ECA) paradigm holds enormous potential in pervasive computing environments. However, the problem of reliable delivery of event data, generated...
Sudip Chakraborty, Nayot Poolsappasit, Indrajit Ra...
93
Voted
WS
2004
ACM
15 years 3 months ago
A man-in-the-middle attack on UMTS
In this paper we present a man-in-the-middle attack on the Universal Mobile Telecommunication Standard (UMTS), one of the newly emerging 3G mobile technologies. The attack allows ...
Ulrike Meyer, Susanne Wetzel
ICC
2008
IEEE
102views Communications» more  ICC 2008»
15 years 4 months ago
Reliable Routing for Roadside to Vehicle Communications in Rural Areas
—The demands for vehicular Internet access are proliferating. Access Points (APs) can be deployed along the roadside to provide wireless coverage and network access for mobile ve...
Shen Wan, Jian Tang, Richard S. Wolff
« Prev « First page 1065 / 1225 Last » Next »