The operation of achieving authenticated key agreement between two human-operated devices over a short range wireless communication channel, such as Bluetooth or WiFi, is known as...
—Convolutional turbo decoding requires large data access and consumes large memories. To reduce the size of the metrics memory, the traceback MAP decoding is introduced for doubl...
1 Wireless broadband technologies like WiMAX2 are spreading especially in areas where wired broadband is not expected to reach. Video streaming is continuously acquiring a larger s...
This paper proposes a pioneering Battery-Sensing Intrusion Protection System (B-SIPS) for mobile computers, which alerts on power changes detected on small wireless devices, using...
Timothy Buennemeyer, Faiz Munshi, Randy C. Marchan...
Abstract— Recent outbreaks of virus and worm attacks targeted at cell phones have bought to the forefront the seriousness of the security threat to this increasingly popular mean...