Sciweavers

6122 search results - page 1091 / 1225
» Securing network access in wireless sensor networks
Sort
View
CCS
2001
ACM
15 years 2 months ago
The performance of public key-enabled kerberos authentication in mobile computing applications
Authenticating mobile computing users can require a significant amount of processing and communications resources— particularly when protocols based on public key encryption are...
Alan Harbitter, Daniel A. Menascé
IMC
2009
ACM
15 years 4 months ago
Practical beamforming based on RSSI measurements using off-the-shelf wireless clients
WLANs have become an important last-mile technology for providing internet access within homes and enterprises. In such indoor deployments, the wireless channel suffers from signi...
Sriram Lakshmanan, Karthikeyan Sundaresan, Sampath...
ICC
2008
IEEE
147views Communications» more  ICC 2008»
15 years 4 months ago
QOAR: Adaptive QoS Scheme in Multi-Rate Wireless LANs
—With the availability of multiple rates in IEEE 802.11a/b/g wireless LANs, it is desirable to improve the network capacity and temporal fairness by sending multiple consecutive ...
Ming Li, Yang Xiao, Hua Zhu, Imrich Chlamtac, Bala...
TWC
2010
14 years 4 months ago
A framework for statistical wireless spectrum occupancy modeling
Abstract--In this paper, we propose a novel spectrum occupancy model designed to generate accurate temporal and frequency behavior of various wireless transmissions. Our proposed w...
Chittabrata Ghosh, Srikanth Pagadarai, Dharma P. A...
TWC
2010
14 years 4 months ago
Cooperative Transmission Protocols for Wireless Broadcast Channels
In this paper, cooperative transmission protocols are proposed for wireless broadcast channels, a fundamental building block of wireless communication networks. The concepts of co...
Zhiguo Ding, Kin K. Leung, Dennis Goeckel, Donald ...
« Prev « First page 1091 / 1225 Last » Next »