Sciweavers

267 search results - page 22 / 54
» Wireless Handheld Devices Become Trusted Network Devices
Sort
View
ICMCS
2006
IEEE
121views Multimedia» more  ICMCS 2006»
15 years 8 months ago
Using P2P Networks for Error Recovery in MBMS Applications
The wireless networks are notoriously error prone and all errors cannot be prevented in real-time communications. The problem of error correction becomes even more challenging in ...
Praveen Sanigepalli, Hari Kalva, Borko Furht
WISEC
2010
ACM
15 years 9 months ago
On the reliability of wireless fingerprinting using clock skews
Determining whether a client station should trust an access point is a known problem in wireless security. Traditional approaches to solving this problem resort to cryptography. B...
Chrisil Arackaparambil, Sergey Bratus, Anna Shubin...
PERCOM
2003
ACM
15 years 7 months ago
Mobile Agent Based Evacuation System When The Battery Runs Out: EASTER
As mobile computing becomes common, the battery issue of mobile computing devices has become increasingly notable. To this end, research and development of various power-conservat...
Heisuke Kaneko, Yoshiaki Fukazawa, Fumihiro Kumeno...
AINA
2010
IEEE
15 years 7 months ago
Testing Cross-Platform Streaming of Video Games over Wired and Wireless LANs
—In this paper we present a new cross-platform approach for video game delivery in wired and wireless local networks. The developed 3D streaming and video streaming approaches en...
Audrius Jurgelionis, Francesco Bellotti, Alessandr...
FASE
2007
Springer
15 years 8 months ago
Maintaining Consistency in Layered Architectures of Mobile Ad-Hoc Networks
Abstract. In this paper we present a layered architecture for modeling workflows in Mobile Ad-Hoc NETworks (manets) using algebraic higher order nets (aho nets). manets are networ...
Julia Padberg, Kathrin Hoffmann, Hartmut Ehrig, To...