Sciweavers

3810 search results - page 128 / 762
» Using mobile agents for network performance management
Sort
View
IDEAL
2004
Springer
15 years 4 months ago
Mobile Data Mining by Location Dependencies
Mobile mining is about finding useful knowledge from the raw data produced by mobile users. The mobile environment consists of a set of static device and mobile device. Previous wo...
Jen Ye Goh, David Taniar
79
Voted
LCN
1999
IEEE
15 years 3 months ago
Packet Level Performance Characteristics of a MAC Protocol for Wireless ATM LANs
This paper determines packet level performance measures of a MAC protocol for a wireless ATM local area network. A key characteristic of the MAC protocol is the Identi er Splittin...
Benny Van Houdt, Chris Blondia, Olga Casals, Jorge...
83
Voted
EURONGI
2005
Springer
15 years 4 months ago
A Low Computation Cost Algorithm to Solve Cellular Systems with Retrials Accurately
Abstract. This paper proposes an approximate methodology for solving Markov models that compete for limited resources and retry when access fails, like those arising in mobile cell...
Maria José Doménech-Benlloch, Jos&ea...
90
Voted
DIM
2005
ACM
15 years 26 days ago
Pseudonym management using mediated identity-based cryptography
Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third ...
Thibault Candebat, Cameron Ross Dunne, David T. Gr...
106
Voted
JSAC
2006
155views more  JSAC 2006»
14 years 11 months ago
LR-AKE-Based AAA for Network Mobility (NEMO) Over Wireless Links
Network mobility introduces far more complexity than host mobility. Therefore, host mobility protocols such as Mobile IPv6 (MIPv6) need to be extended to support this new type of m...
Hanane Fathi, SeongHan Shin, Kazukuni Kobara, Shya...