Sciweavers

494 search results - page 85 / 99
» The Conference Call Search Problem in Wireless Networks
Sort
View
PERCOM
2005
ACM
15 years 11 months ago
Accessing Ubiquitous Services Using Smart Phones
The integration of Bluetooth service discovery protocol (SDP), and GPRS internet connectivity into phones provides a simple yet powerful infrastructure for accessing services in n...
Nishkam Ravi, Peter Stern, Niket Desai, Liviu Ifto...
PERCOM
2009
ACM
15 years 6 months ago
Towards Privacy-Sensitive Participatory Sensing
—The ubiquity of mobile devices has brought forth the concept of participatory sensing, whereby ordinary citizens can now contribute and share information from the urban environm...
Kuan Lun Huang, Salil S. Kanhere, Wen Hu
WCNC
2008
IEEE
15 years 6 months ago
Senslets- Applets for the Sensor Internet
The Sensor Internet provides access to sensor services by connecting sensor nodes to the Internet infrastructure. To achieve this, current solutions rely on fixed access points or ...
Frank Siegemund, Muhammad Haroon, Junaid Ansari, P...
TIT
2010
105views Education» more  TIT 2010»
14 years 6 months ago
Multigroup ML decodable collocated and distributed space-time block codes
In this paper, collocated and distributed space-time block codes (DSTBCs) which admit multigroup maximum-likelihood (ML) decoding are studied. First, the collocated case is conside...
G. Susinder Rajan, B. Sundar Rajan
SERSCISA
2009
Springer
15 years 6 months ago
ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION
Denial-of-Service (DoS) and Distributed DoS (DDoS) attacks can cause serious problems in wireless networks due to limited network and host resources. Attacker traceback is a promi...
Yongjin Kim