Sciweavers

267 search results - page 26 / 54
» Wireless Handheld Devices Become Trusted Network Devices
Sort
View
CORR
2006
Springer
97views Education» more  CORR 2006»
15 years 2 months ago
Trusted Computing in Mobile Action
Due to the convergence of various mobile access technologies like UMTS, WLAN, and WiMax the need for a new supporting infrastructure arises. This infrastructure should be able to ...
Nicolai Kuntze, Andreas U. Schmidt
COMPSAC
2009
IEEE
15 years 6 months ago
ELALPS: A Framework to Eliminate Location Anonymizer from Location Privacy Systems
—Countless challenges to preserving a user’s location privacy exist and have become more important than ever before with the proliferation of handheld devices and the pervasive...
Mehrab Monjur, Sheikh Iqbal Ahamed, Chowdhury Shar...
IAT
2010
IEEE
14 years 12 months ago
DLB-SDPOP: A Multiagent Pseudo-tree Repair Algorithm for Load Balancing in WLANs
The traffic load of wireless local area networks (WLANs) is often distributed unevenly among access points. In addition, interference from collocated wireless devices operating in...
Shanjun Cheng, Anita Raja, Jiang Xie, Ivan Howitt
ICDS
2010
IEEE
15 years 8 months ago
Body Sensor Networks for Mobile Health Monitoring: Experience in Europe and Australia
—Remote ambulatory monitoring is widely seen as playing a key part in addressing the impending crisis in health care provision. We describe two mobile health solutions, one devel...
Val Jones, Valérie Gay, Peter Leijdekkers
IEICET
2006
131views more  IEICET 2006»
15 years 1 months ago
Quick Data-Retrieving for U-APSD in IEEE802.11e WLAN Networks
The IEEE802.11e defines a MAC protocol, which provides EDCA (enhanced distributed channel access) and HCCA (HCF controlled channel access) to support differentiation service over W...
Shojiro Takeuchi, Kaoru Sezaki, Yasuhiko Yasuda