default search action
4th Q2SWinet 2008: Vancouver, British Columbia, Canada
- Albert Y. Zomaya, Matteo Cesana:
Q2SWinet'08 - Proceedings of the 4th ACM Workshop on Q2S and Security for Wireless and Mobile Networks, Vancouver, British Columbia, Canada, October 27-28, 2008. ACM 2008, ISBN 978-1-60558-237-5
Quality of service in wireless broadband networks I
- Gabriele Cecchetti, Anna Lina Ruscelli:
Performance evaluation of real-time schedulers for HCCA function in IEEE 802.11e wireless networks. 1-8 - T. H. Szymanski:
Throughput and QoS optimization in nonuniform multichannel wireless mesh networks. 9-19 - Peng Jiang, Yasar Ahmet Sekercioglu:
A dynamic call admission control scheme for optimization with QoS provisioning in multiclass cellular networks. 19-26
Security architectures for wireless/wired access networks
- Rodolphe Marques, André Zúquete:
Fast, secure handovers in 802.11: back to the basis. 27-34 - Fabio Martignon, Stefano Paris, Antonio Capone:
MobiSEC: a novel security architecture for wireless mesh networks. 35-42 - Mirco Marchetti, Michele Colajanni:
Adaptive traffic filtering for efficient and secure IP-mobility. 43-50 - Khalil El-Khatib:
The cost of protecting privacy in multimedia applications. 51-54
Quality of service in wireless broadband networks II
- Guntur Ravindra, Joseph Thaliath, Ian D. Chakeres:
In-network optimal rate reduction for packetized MPEG video. 55-62 - Syed Zubair Ahmad, Muhammad Abdul Qadir, Mohammad Saeed Akbar:
A distributed resource management scheme for load-balanced QoS provisioning in heterogeneous mobile wireless networks. 63-70 - Soon-Young Oh, Gustavo Marfia, Mario Gerla:
ProbeCast: MANET admission control via probing. 71-78 - Nityananda Sarma, Sukumar Nandi:
A priority based QoS-Aware MAC protocol (PQAMP) in mobile ad hoc networks. 79-82
Security, trust and reputation in wireless ad hoc networks
- Marie Elisabeth Gaup Moe, Bjarne E. Helvik, Svein J. Knapskog:
TSR: trust-based secure MANET routing using HMMs. 83-90 - Mozhgan Tavakolifard, Svein J. Knapskog, Peter Herrmann:
Trust transferability among similar contexts. 91-97 - Friederike Klan, Mathias Röhl, Birgitta König-Ries, Adelinde M. Uhrmacher:
Using context information to evaluate cooperativeness. 98-105 - Dae-Hee Seo, Jang-Mi Baek, Dong-Sub Cho:
Secure authentication and management scheme for RFID. 106-110
Poster contributions on QoS and security for wireless networks
- Thomas Gamer, Lars Völker, Martina Zitterbart:
Differentiated security in wireless mesh networks. 111-112 - Janet Light, Deepika David:
An efficient security algorithm in mobile computing for resource constrained mobile devices. 113-114
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.