Sciweavers

14824 search results - page 2744 / 2965
» Security - Introduction
Sort
View
101
Voted
TWC
2008
109views more  TWC 2008»
15 years 2 months ago
Using the physical layer for wireless authentication in time-variant channels
Abstract--The wireless medium contains domain-specific information that can be used to complement and enhance traditional security mechanisms. In this paper we propose ways to expl...
Liang Xiao, Larry J. Greenstein, Narayan B. Manday...
114
Voted
TWC
2008
176views more  TWC 2008»
15 years 2 months ago
Key Management for UMTS MBMS
3GPP 33.246 proposes Key Management Mechanism (KMM) to distribute security keys for Universal Mobile Telecommunications System (UMTS) Multimedia Broadcast and Multicast Service (MB...
Shin-Ming Cheng, Wei-Ru Lai, Phone Lin, Kwang-Chen...
131
Voted
VLC
2008
146views more  VLC 2008»
15 years 2 months ago
Interactive visual analysis of geographic data on mobile devices based on dynamic queries
The capabilities of current mobile devices, especially PDAs, are making it possible to design and develop mobile applications that employ visual techniques for using geographic da...
Stefano Burigat, Luca Chittaro
106
Voted
WICOMM
2008
108views more  WICOMM 2008»
15 years 2 months ago
The multimedia broadcast/multicast service
Abstract-- This article provides an overview of the multimedia broadcast/multicast service (MBMS) for universal mobile telecommunications system (UMTS) networks. We first outline t...
George Xylomenos, Vasilis Vogkas, George Thanos
162
Voted
ANSOFT
2002
171views more  ANSOFT 2002»
15 years 2 months ago
OPM/Web - Object-Process Methodology for Developing Web Applications
Web applications can be classified as hybrids between hypermedia and information systems. They have a relatively simple distributed architecture from the user viewpoint, but a comp...
Iris Reinhartz-Berger, Dov Dori, Shmuel Katz
« Prev « First page 2744 / 2965 Last » Next »