Sciweavers

9832 search results - page 1881 / 1967
» Wireless mesh networking
Sort
View
UIC
2009
Springer
15 years 4 months ago
Implicit User Re-authentication for Mobile Devices
Abstract. Portable computers are used to store and access sensitive information. They are frequently used in insecure locations with little or no physical protection, and are there...
Sausan Yazji, Xi Chen, Robert P. Dick, Peter Scheu...
WADS
2009
Springer
262views Algorithms» more  WADS 2009»
15 years 4 months ago
Compact and Low Delay Routing Labeling Scheme for Unit Disk Graphs
Abstract. In this paper, we propose a new compact and low delay routing labeling scheme for Unit Disk Graphs (UDGs) which often model wireless ad hoc networks. We show that one can...
Chenyu Yan, Yang Xiang, Feodor F. Dragan
MHCI
2009
Springer
15 years 4 months ago
Using semantic descriptions for adaptive mobile games UIs
Mobile devices became powerful recently and wireless Internet access is becoming standard. One important class of networked, mobile applications are location based games, making e...
Pascal Bihler, Holger Mügge, Mark Schmatz, Ar...
CISS
2008
IEEE
15 years 4 months ago
Resource and power costs in dynamic spectrum allocation
— We consider a network setting, where a single Service Provider (SP) provides wireless data services to a group of users in the downlink. The transmission model is similar to OF...
Joydeep Acharya, Roy D. Yates
CISS
2008
IEEE
15 years 4 months ago
Distributed detection in the presence of frequency offset and phase shift
— In this paper, we study the problem of distributed detection in the presence of unknown carrier frequency offset (CFO) and initial phase, the issue we encounter in the emerging...
Tao Wu, Qi Cheng
« Prev « First page 1881 / 1967 Last » Next »